Files
vm-cloudflare/cloudflare_waf_baseline.md
Vault Sovereign 37a867c485 Initial commit: Cloudflare infrastructure with WAF Intelligence
- Complete Cloudflare Terraform configuration (DNS, WAF, tunnels, access)
- WAF Intelligence MCP server with threat analysis and ML classification
- GitOps automation with PR workflows and drift detection
- Observatory monitoring stack with Prometheus/Grafana
- IDE operator rules for governed development
- Security playbooks and compliance frameworks
- Autonomous remediation and state reconciliation
2025-12-16 18:31:53 +00:00

1.6 KiB
Raw Permalink Blame History

Cloudflare WAF Baseline

Purpose

A hardened, reproducible baseline for Web Application Firewall (WAF) configuration across VaultMesh, OffSec, and associated domains.


1. Core WAF Mode

  • OWASP Core Ruleset: Enabled (Latest version)
  • Paranoia Level: 1 (default) raise to 2 for internal/admin surfaces
  • Bot Protection: Enabled
  • Super Bot Fight Mode: Enabled (if plan supports)
  • API Shield: Enabled on /api/* paths

2. Mandatory Managed Rules

  • Cloudflare Managed WAF Rules: Enabled
  • Directory Traversal: Block
  • SQL Injection: Block
  • XSS: Block
  • File Inclusion: Block
  • Broken Authentication: Block
  • Common Vulnerabilities: Block

3. Custom Firewall Rules (Baseline)

Block non-HTTPS

(if not ssl) then block

Restrict admin panels

(http.request.uri.path contains "/admin" and ip.src not in {trusted_admin_ips}) -> block

Rate-limit API endpoints

Path: /api/
Threshold: 30 req/10s per IP
Action: block for 1 minute

Challenge suspicious countries

ip.src.country in {CN, RU, KP, IR} -> managed_challenge

4. TLS Settings

  • TLS Mode: Full (strict)
  • Minimum TLS Version: 1.2
  • HSTS: Enabled (1 yr + includeSubDomains)
  • TLS Keyless Origin: Optional (if needed)

5. Logging & Metrics

  • Logpush to R2/SIEM: Enabled
  • Track:
    • WAF rule matches
    • Rate-limit triggers
    • Bot detections
    • Country spikes
  • Alerts:
    • 10× spike in WAF blocks
    • Repeated blocks for same URI

6. Change-Control

All modifications:

  1. Must be captured in VaultMesh receipt
  2. Weekly WAF snapshot → anchored
  3. Changes require dual approval for OffSec cluster