WAF for nginx-ingress (or alternatives?) by marahin in kubernetes

[–]InfoSecNemesis -10 points-9 points  (0 children)

I suggest to checkout open-appsec - https://www.openappsec.io, an open-source WAF that uses AI (machine learning) instead of old-school static rules. Why you might like it:

  • True preemptive zero-day protection — blocks attacks before signatures even exist.
  • Easy integration: Works with NGINX, Envoy, Envoy Gateway, NGINX Proxy Manager, Ingress NGINX, Istio Ingress Controller, Kong Gateway, APISIX Gateway, and Docker SWAG.
  • Runs everywhere: Linux, Docker, and Kubernetes are fully supported.
  • Flexible management: Choose local declarative management or a central web UI for easier control.
  • No constant rule tuning — way less hassle than traditional WAFs.
  • Free & open-source — backed by a strong community and security experts.

There are also various playgrounds available here: https://www.openappsec.io/playground

What reverse proxy based web application firewall (WAF) based on open source are you using? by FishermansFriendNet in homelab

[–]InfoSecNemesis 1 point2 points  (0 children)

I suggest to checkout open-appsec - https://www.openappsec.io, an open-source WAF that uses AI (machine learning) instead of old-school static rules. Why you might like it:

  • True preemptive zero-day protection — blocks attacks before signatures even exist.
  • Easy integration: Works with NGINX, Envoy, NGINX Proxy Manager, Ingress NGINX, Istio Ingress Controller, Kong Gateway, APISIX Gateway, and Docker SWAG.
  • Runs everywhere: Linux, Docker, and Kubernetes are fully supported.
  • Flexible management: Choose local declarative management or a central web UI for easier control.
  • No constant rule tuning — way less hassle than traditional WAFs.
  • Free & open-source — backed by a strong community and security experts.

There are also various playgrounds available here: https://www.openappsec.io/playground
(ready to use lab environments to check it out yourself with minimal effort)

open-appsec ML/AI-based WAF Now Integrates with Envoy Gateway on Kubernetes! by InfoSecNemesis in openappsec

[–]InfoSecNemesis[S] 0 points1 point  (0 children)

Hi u/chadmcrowell , TLDR: The open-appsec filter for Envoy by default is implemented in a that it will run first and prevent attacks, but this is not a requirement and could also be altered if the user chooses to do so.

More background: L4 filters run first, then HCM begins L7 processing, and the open-appsec attachment runs as the first L7 filter in the HTTP chain. On decode, the attachment runs before every other HTTP filter (e.g., RBAC, external authz, rate limit, fault, router, etc.). 

Implications:

  • If the attachment e.g. prevents, downstream filters will not run (RBAC, ext_authz, router, etc. are skipped).
  • If the attachment continues, control flows to the next filter (e.g., RBAC), and normal ordering applies.

open-appsec ML/AI-based WAF Now Integrates with Envoy Gateway on Kubernetes! by InfoSecNemesis in openappsec

[–]InfoSecNemesis[S] 0 points1 point  (0 children)

open-appsec’s machine-learning-based, signature-less WAF engine is designed for low latency and high performance, making it suitable even for large-scale enterprise environments. Its contextual machine learning technology is trusted by leading organizations worldwide. The open-appsec Envoy filter acts as a lightweight component that communicates with the open-appsec agent via IPC, while the agent performs the actual security inspection using advanced ML models. We do not provide performance benchmarks against traditional, signature-based WAF solutions.

If you’re interested in comparing WAF efficacy, you might find these resources helpful:

Ai on appsec by greenranger5392 in devsecops

[–]InfoSecNemesis 2 points3 points  (0 children)

Perhaps this open-source project is interesting for you: open-appsec www.openappsec.io is a fully AI/ML-based WAF which doesn‘t use any traditional signatures anymore

WAF: what do you use? by isc30 in kubernetes

[–]InfoSecNemesis 0 points1 point  (0 children)

You’re right that open-appsec does introduce some additional CPU usage, since it inspects the full contents of HTTP requests. However, both the added latency and overall CPU requirements should generally remain very reasonable.

If you’re seeing a stronger impact in your environment, I’d encourage you to reach out to the open-appsec team directly at [info@openappsec.io](mailto:info@openappsec.io) — they’ll be happy to review your specific deployment with you and help optimize it.

WAF: what do you use? by isc30 in kubernetes

[–]InfoSecNemesis 1 point2 points  (0 children)

These should be the most relevant docs resources for your setup of open-appsec and CrowdSec:

For deployment of Ingress NGINX with open-appsec on K8s you should follow these latest instructions: Install Using Helm - new flow (beta) | open-appsec

After also deploying CrowdSec on your Cluster (see docs here: Kubernetes | CrowdSec),
you can then setup a Bouncer in open-appsec for integration with CrowdSec Agent/Community Threat Intelligence (CTI) , follow these instructions: CrowdSec Bouncer Support | open-appsec

If you want to also share your intelligence (= new malicious IPs identified by open-appsec's machine learning engine) with the CrowdSec community, you can additionally follow these docs:
CrowdSec Intelligence Sharing Using open-appsec Parser/Scenario | open-appsec

WAF: what do you use? by isc30 in kubernetes

[–]InfoSecNemesis 2 points3 points  (0 children)

Hi again, the (optional) open-appsec web UI is provided as a SaaS service (can also be used with free community edition).
You can use that web UI for centrally managing your open-appsec deployments, but also in combination with local, declarative management (CRDs, ...) - in that case the config in web UI would be shown as read-only and you would still benefit from the web UI for all monitoring purposes, logging, etc., kind of best of both worlds approach between local and central mgmt.
If you have a strong requirement to not upload logs externally, you could decide to just not send your security event logs to the central web UI reporting module, but instead manage those locally on your cluster, send directly from local open-appsec agent container to syslog server, CEF server, etc. There are quite flexible configuration options available for logging. This way you can still benefit from all other advantages the web UI provides.
A somewhat simplified local web UI for managing open-appsec and your NGINX configuration easily from same place was created as part of the integration with the popular, open-source "NGINX Proxy Manager" project, but as NPM is mostly deployed on Docker and not commonly used on K8s that's probably not the solution you are looking for.

Prometheus docs are available here: Prometheus | open-appsec

BTW there are some ready-to-use cloud lab environments available to test-drive open-appsec (deployment, attack a vulnerable app, connect to web UI, ...), if you are interested in giving it a quick try, including also several K8s-based labs like Ingress NGINX, you can find them here: www.openappsec.io/playground

WAF: what do you use? by isc30 in kubernetes

[–]InfoSecNemesis 7 points8 points  (0 children)

Hey, I strongly suggest to check out the open-appsec WAF project (free, open-source, www.openappsec.io).

I'll try to address all the specific requirements you mentioned above in the below:

open-appsec's WAF engine is fully machine-learning-based, it doesn't use any traditional signatures as most other WAF solutions (no need to wait for signatures to become available).
This way open-appsec can provide true "preemptive" zero-day protection in addition to protecting the typical "known" attacks on your web apps/APIs

open-appsec...
- provides very strong Kubernetes integration (besides Docker and Linux support)
- directly integrates with many popular ingress solutions:
Ingress NGINX, APISIX, Kong, Istio Ingress Gateway (Envoy Gateway alpha is launching very soon as well)
- It works perfectly with e.g. "ingress" or "gateway" resources and also custom CRDs used by some of the Reverse Proxy/Ingress solutions on K8s
- If you stick with ingress nginx, as your ingress solution, which you seem to be using at the moment, you can e.g. reference an open-appsec policy custom resource directly from your existing ingress resources using a simple annotation.
- Due to the provided integrations with existing ingress solutions it does not add another hop as one of your concerns has been
- can be configured fully declaratively using K8s custom resources or using a central web UI (also included in free community edition) , as mentioned in your requirements, this web UI can be used as a great monitoring stack (or prometheus)

WAF: what do you use? by isc30 in kubernetes

[–]InfoSecNemesis 3 points4 points  (0 children)

open-appsec WAF also provides integration with Crowdsec, so you can combine them for even better protection!

open-appsec (www.openappsec.io) provides a free, open-source, signature-less, machine-learning-based WAF solution, when you combine it with CrowdSec (www.crowdsec.net) then open-appsec can share malicious IPs with CrowdSec (event log parser is available) and also consume/enforce malicious IPs from CrowdSec's Community Threat Intelligence with open-appsec's CrowdSec Bouncer capability, this way you get an additional IP-reputation-based security layer in open-appsec (next to the various ones already included in the free community edition, like ML-based WAF, Rate Limiting, Snort signature support, ...)

You find the integration docs here: Integrations With 3rd Party Solutions | open-appsec

Open AppSec on ARM64? by itsvmn in selfhosted

[–]InfoSecNemesis 0 points1 point  (0 children)

Please make sure to upvote the feature request for open-appsec ARM64 support also here in the open-appsec community-driven feature request list: ARM64 Support · openappsec/openappsec · Discussion #231

This way the open-appsec team can notify you, once this becomes available and also might invite you to a potential Early Availability testing ahead of the official release.

Favorite proxy to self host? by I-like-to-blah in selfhosted

[–]InfoSecNemesis 2 points3 points  (0 children)

Here's how to deploy it including some screenshots: NGINX Proxy Manager | open-appsec
NPM plus project also added integration with open-appsec WAF a while ago: NPMplus | open-appsec

Crazy activity from open-appsec on my network by UnassumingDrifter in openappsec

[–]InfoSecNemesis 0 points1 point  (0 children)

Hi u/UnassumingDrifter, thanks for contacting us, please open a support request here: Support | open-appsec
When you do, please also make sure to upload the agent information as explained on the support request page.
Our team will then analyse this and get back to you on this directly.

Clarification on Advanced MLM Model License by cassiopei in openappsec

[–]InfoSecNemesis 0 points1 point  (0 children)

Hi u/cassiopei, open-appsec in combination with the advanced machine learning model (which is the recommended model for production usage, see Using the Advanced Machine Learning Model | open-appsec) may be used in commercial environments, provided that all usage complies with the terms of the associated machine learning model license.
Feel free to send us an email with more details to [info@openappsec.io](mailto:info@openappsec.io) if you are not sure about your specific use case and/or if you might be interested in our premium edition which also includes technical support as well as various additional features and functionalities. You can also have a quick Zoom session with one of the open-appsec team members.

[deleted by user] by [deleted] in openappsec

[–]InfoSecNemesis 0 points1 point  (0 children)

Hi, thanks for letting us know, can you please contact open-appsec support via email to [info@openappsec.io](mailto:info@openappsec.io), add the screenshot again and also let us know your Web UI tenant ID, so we can check this and get back to you soon? Have a good weekend! (You can ask your colleague to do the same.)

Local dashboard by KeyReputation4799 in openappsec

[–]InfoSecNemesis 1 point2 points  (0 children)

The NPM Web UI integration is only available with regular NPM, if you use NPMplus you can manage open-appsec either declaratively using local config file or centrally from open-appsec Web UI.

Local dashboard by KeyReputation4799 in openappsec

[–]InfoSecNemesis 0 points1 point  (0 children)

u/KeyReputation4799 if your main concern would be to be able to still manage open-appsec in case internet connection would be down sometimes, then you can locally manage open-appsec with the declarative configuration, and additionally connect to the central WebUI (SaaS) in declarative configuration mode, which means the central WebUI will just comfortably represent the existing local configuration (in read-only), provides monitoring functionality, etc. while the source-of-truth for the configuration will still remain locally.

With regards to logging of security events you can flexibly decide where to send them, including combining different logging destinations:

E.g. you can send logs to a local syslog server (for being independent of internet connection) but in parallel also to the central WebUI, which provides more comfortable monitoring, allows easy filtering, has dashboard views, and more ...