Clarification on Addition and Updates of Rules in Azure WAF Managed Rule Sets (OWASP CRS) and Impact on Exclusions
Hello Azure Support Team,
We have some questions regarding the management and update process of Azure Web Application Firewall (WAF) managed rule sets, specifically around the OWASP Core Rule Set (CRS) versions:
- How are new rules added to the managed rule sets? Are new rules only included in new OWASP CRS versions, or can they also be pushed as updates to existing versions?
If our WAF policy is currently using OWASP CRS version 3.2, can we consider this a stable and unchanging set of rules?
Does the OWASP 3.2 rule set receive updates over time, such as adding new rules or modifying existing ones, without requiring a manual upgrade to a newer CRS version?
When new rules are added to an existing rule set, are they by default added in log mode (monitoring only), or are they enforced immediately?
Additionally, we want to understand the implications of enabling managed rule sets with specific exclusions or customizations. For example:
If we have created exclusions to avoid blocking legitimate traffic based on known rules, but later new rules are added to the same rule set, is there a risk that these new rules might inadvertently block legitimate traffic that hasn’t been tested by us?
How does Azure WAF handle such situations to prevent unexpected blocking, especially if new rules are added and enforced automatically without manual intervention?
Understanding this is critical for us to manage WAF policies safely and avoid potential disruptions caused by automatic updates or new rules.
Thank you for your guidance and support.Hello Azure Support Team,
We have some questions regarding the management and update process of Azure Web Application Firewall (WAF) managed rule sets, specifically around the OWASP Core Rule Set (CRS) versions:
How are new rules added to the managed rule sets? Are new rules only included in new OWASP CRS versions, or can they also be pushed as updates to existing versions?
If our WAF policy is currently using OWASP CRS version 3.2, can we consider this a stable and unchanging set of rules?
Does the OWASP 3.2 rule set receive updates over time, such as adding new rules or modifying existing ones, without requiring a manual upgrade to a newer CRS version?
When new rules are added to an existing rule set, are they by default added in log mode (monitoring only), or are they enforced immediately?
Additionally, we want to understand the implications of enabling managed rule sets with specific exclusions or customizations. For example:
If we have created exclusions to avoid blocking legitimate traffic based on known rules, but later new rules are added to the same rule set, is there a risk that these new rules might inadvertently block legitimate traffic that hasn’t been tested by us?
How does Azure WAF handle such situations to prevent unexpected blocking, especially if new rules are added and enforced automatically without manual intervention?
Understanding this is critical for us to manage WAF policies safely and avoid potential disruptions caused by automatic updates or new rules.
Thank you for your guidance and support.