IBM Support

How do I configure a Security Verify Access Reverse Proxy instance to use ModSecurity as the Web Application Firewall for junctioned resources

Question & Answer


Question

IBM Security Verify Access includes ModSecurity as an embedded Web Application Firewall (WAF). I need to protect my web space from a wide range of attacks including the "OWASP Top Ten", a list of attack vectors commonly used to exfiltrate sensitive information from organizations. How can I configure a Reverse Proxy instance to use the ModSecurity and protect my web space against different attack vectors?

[{"Type":"MASTER","Line of Business":{"code":"LOB77","label":"Automation Platform"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSRGTL","label":"IBM Security Verify Access"},"ARM Category":[{"code":"a8m0z000000cxuqAAA","label":"Security Verify Access-\u003EReverse Proxy"}],"ARM Case Number":"TS011899433","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"10.0.5;and future releases"}]

Log InLog in to view more of this document

This document has the abstract of a technical article that is available to authorized users once you have logged on. Please use Log in button above to access the full document. After log in, if you do not have the right authorization for this document, there will be instructions on what to do next.

Historical Number

TS011876625

Product Synonym

ISVA

Document Information

More support for:
IBM Security Verify Access

Component:
Security Verify Access->Reverse Proxy

Software version:
10.0.5 and future releases

Document number:
6856751

Modified date:
03 February 2023

UID

ibm16856751

Manage My Notification Subscriptions