Application Protection Overview
To protect your applications with RASP, you simply need to add probes to them, without having to modify application files.
Technical Principles
Probes (monitoring and protection code) are added to the checkpoints (key functions) of applications through dynamic code injection. The probes identify attacks based on predefined rules, data passing through the checkpoints, and contexts (application logic, configurations, data, and event flows).
Constraints and Limitations
- To use application protection for a server, enable the HSS premium, web tamper protection, or container edition.
- Application protection is only applicable to Java applications on based on JDK 8 Linux servers.
Process of Using Application Protection
Operation |
Description |
---|---|
Enable application protection for a server to assess application security in real time. |
|
Analyze triggered events, harden application protection measures, and improve application security. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.