What is our primary use case?
The main use cases for Cloudflare Web Application Firewall (WAF) are to protect organizations from attacks by bad actors and hackers. We have a process for this, where we first whitelist employees and third-party clusters to prevent attacks.
Then, we divide WAF into three main sections: WAF Protect score, WAF score, and threat score. We also make adjustments based on the specific needs of each organization. These are the general steps at a high level.
Cloudflare WAF is a comprehensive system with many aspects and in-depth documentation that can be tailored to specific client requirements.
The use cases vary depending on the client, whether they are retail or banking sectors, as each has different needs and requirements. We maintain the WAF configurations based on these specific needs.
How has it helped my organization?
There are many incidents we handle daily. We have a large client. We implemented rate limiting and deployed a worker in correlation with the WAF to protect their API endpoints regarding pricing and inventory.
We successfully mitigated a bot attack with that combination of measures for our customer recently. It is one of the successful mitigation.
Cloudflare is very flexible.
What is most valuable?
Cloudflare has many features, but the custom rules are the best tool. There are many fields you can use to protect an organization.
There is also a very good system in the managed toolset, with different parts. One is the Cloudflare Managed Ruleset, which protects the application from malicious signatures.
The second is the OWASP ModSecurity Core Rule Set, which protects from the top ten vulnerabilities and zero-day attacks.
The third is the anomaly detection checks and credential checks, which identify potential threats like leaked credentials.
There are many other important sections in Cloudflare WAF, like IP access rules, zone lockdown, and user agent blocking.
Another important feature is rate limiting, which limits specific requests to prevent attacks like brute force attacks on URLs.
These are some of the important features of Cloudflare WAF.
What needs improvement?
Account-level features would be a very good option. Some clients want to implement the same checks on multiple zones (URLs or websites). Cloudflare recently introduced account-level features, but it's not widely used by clients yet. We are working with Cloudflare on different aspects of zone-level implementation. If account-level features are implemented for certain use cases, it would be a big improvement.
So, pushing more awareness around account-level features would be a plus.
For how long have I used the solution?
I have been using it for three years now.
What do I think about the stability of the solution?
It is a stable product. I would rate the stability a ten out of ten.
How was the initial setup?
It is a technical process, but for us, it is very easy. We have standards and internal scripts that we use for deployment. It is a very easy process on our side because we have been working on it for three years. But for new users, it might require some learning.
I would rate my experience with the initial setup a nine out of ten, with ten being very easy. Cloudflare WAF is only for public URLs, so it is only for public cloud.
Deploying the WAF itself is a click of a button, but implementing it with a company's or client's specific requirements takes time. The process varies from company to company and client to client, but implementation is very simple.
What was our ROI?
WAF doesn't directly affect bandwidth costs. It saves costs on protection. However, with the correct setup, it's difficult to determine if it saves costs overall due to the fixed enterprise plan fee.
The caching system can save bandwidth by caching static content, but WAF itself isn't a major factor in cost savings. There are many other factors involved.
What other advice do I have?
It protects public-facing URLs. That is the biggest advantage.
Overall, I would rate the solution a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer.