Creating Imperva WAF Rules for Dynamic Analysis
You can create web application firewalls (WAF) rules using Imperva. You can use these rules to block potential attacks based on the results of your dynamic scans.
The Veracode Imperva integration exports the vulnerabilities found in Dynamic Analysis scan results for import into the Imperva SecureSphere management console. This console converts the vulnerabilities to rules and uploads them to the WAF. These rules are not guaranteed nor designed to fix every vulnerability discovered. Veracode recommends an in-depth defense strategy that also may require code-level remediation.
To complete this task:
In the Veracode Platform, select My Portfolio > Applications.
Locate an application with a completed Dynamic Analysis scan.
In the Scan Status column, click Dynamic Scan to open the Application page.
In the left pane, under Completed, click WAF Integration.
Select Imperva from the Format dropdown menu.
Veracode generates a text file containing the Imperva rules that you can upload to your WAF.
Upload these rules to your WAF.
Run a Dynamic Analysis to verify the effectiveness of the WAF rules.