What is the best approach to web application security? For many years, the negative security model was the basis of all Web Apllication Firewalls (WAF). Today, this is being supplanted by the positive security model. Before discussing why this is true, some background information will be helpful.
Positive security is the opposite of negative security (the more traditional approach):
These two approaches are sometimes known as the “blacklisting” model and the “whitelisting” model, respectively:
For decades, negative security was the typical approach. Today, positive security is also becoming popular, especially in next-generation WAFs. Why is this true?
There are several flaws with the negative security model, including:
The negative security model has a lot of weaknesses, making the positive security model favorable by contrast. But are there any downsides or issues with the positive security model?
The short answer is yes. For starters, the positive security model is much harder, time-intensive, and expensive to implement. Admins must establish rules and criteria to allow only acceptable requests through, which can be very difficult. Data types, structures and syntaxes, input characters, and value ranges all must be considered—and this is a complex undertaking even for experienced cybersecurity experts.
Additionally, the positive security model opens the door to false positive alarms. With the negative security model, false negatives are the issue—it’s possible for a genuine threat to get through your layers of security. But with a positive security model, the more common problems are flagged threats that aren’t threats at all, resulting in annoyance and unnecessary time waste.
Lastly, in some cases, a positive security model is (for lack of a better term) overkill. While there are many types of threats that can sneak past a negative security model, the negative model is sufficient to block the majority of the biggest and most common threats.
That being said, a negative security model will still miss detecting some threats. A positive security model is, by its nature, much more likely to catch the attacks that a negative security model may miss.
To achieve the best possible protection for an organization, the most popular modern approach is to employ a hybrid approach. A negative security model can filter out the most obvious and hostile threats, while whitelisting and input validation can be employed for requests that pass through the first barrier of defense.
Do you have any questions on this topic? Our security experts will be happy to talk to you about a suitable security concept.