11---
22
3- title : ModSecurity Core Rule Set
3+ title : OWASP CRS
44layout : col-document
55tags : OWASP Developer Guide
66contributors : Jon Gadsden
@@ -24,35 +24,35 @@ permalink: /draft/operations/modsecurity_core_rule_set/
2424
2525![ CRS logo] ( ../../../assets/images/logos/crs.png " OWASP CRS ") {: .image-right }
2626
27- ### 9.4 ModSecurity Core Rule Set
27+ ### 9.4 OWASP CRS
2828
29- The OWASP ModSecurity [ Core Rule Set ] [ modcrs -project] (CRS) project is a set of generic attack detection rules
29+ The [ OWASP CRS ] [ crs -project] project, formerly known as Core Rule Set, is a set of generic attack detection rules
3030for use with [ ModSecurity] [ modsec ] compatible web application firewalls such as [ OWASP Coraza] [ coraza ] .
31- CRS is an OWASP [ Flagship tool project] [ modcrs -project] and can be [ downloaded] [ modcrs -download]
31+ CRS is an OWASP [ Flagship tool project] [ crs -project] and can be [ downloaded] [ crs -download]
3232for either Apache or IIS/Nginx web servers.
3333
34- #### What is the Core Rule Set ?
34+ #### What is the CRS ?
3535
36- The [ Core Rule Set ] [ modcrs ] (CRS) are attack detection rules for use with [ ModSecurity] [ modsec ] ,
37- [ Coraza[ coraza] and other ModSecurity compatible web application firewalls.
36+ The [ CRS ] [ crs ] are attack detection rules for use with [ ModSecurity] [ modsec ] ,
37+ [ Coraza] [ coraza ] and other ModSecurity compatible web application firewalls.
3838The CRS aims to protect web applications from a wide range of attacks with a minimum of false alerts.
3939The CRS provides protection against many common attack categories, including those in the OWASP Top Ten.
4040
4141#### Why use it?
4242
4343If an organization is using a Coraza, ModSecurity or compatible Web Application Firewall (WAF)
44- then it is very likely that the [ Core Rule Set ] [ modcrs ] is already in use by this WAF.
44+ then it is very likely that the [ CRS ] [ crs ] is already in use by this WAF.
4545The CRS provides the policy for the Coraza / Modsecurity engine so that traffic to a web application is inspected
4646for various attacks and malicious traffic is blocked.
4747
4848#### How to use it
4949
50- The use of the Core Rule Set assumes that a ModSecurity, Coraza or compatible WAF has been installed.
50+ The use of the CRS assumes that a ModSecurity, Coraza or compatible WAF has been installed.
5151Refer to the [ Coraza tutorial] [ coraza-tutorial ] or the [ ModSecurity] [ modsec-docs ] on how to do this.
5252
53- To get started with CRS refer to the Core Rule Set [ installation instructions] [ modcrs -download] .
53+ To get started with CRS refer to the CRS [ installation instructions] [ crs -download] .
5454
55- The OWASP Spotlight series provides an overview of how to use this Core Rule Set :
55+ The OWASP Spotlight series provides an overview of how to use this CRS :
5656'Project 3 - [ Core Rule Set (CRS) - 1st Line of Defense] [ spotlight03 ] '.
5757
5858----
@@ -64,9 +64,9 @@ then [submit an issue][issue1104] or [edit on GitHub][edit1104].
6464[ coraza-tutorial ] : https://coraza.io/docs/tutorials/quick-start/
6565[ edit1104 ] : https://github.com/OWASP/www-project-developer-guide/blob/main/draft/11-operations/04-modsecurity-crs.md
6666[ issue1104 ] : https://github.com/OWASP/www-project-developer-guide/issues/new?labels=content&template=request.md&title=Update:%2011-operations/04-modsecurity-crs
67- [ modcrs ] : https://coreruleset.org/
68- [ modcrs -download] : https://coreruleset.org/docs/deployment/install/
69- [ modcrs -project] : https://owasp.org/www-project-modsecurity-core-rule-set/
67+ [ crs ] : https://coreruleset.org/
68+ [ crs -download] : https://coreruleset.org/docs/deployment/install/
69+ [ crs -project] : https://owasp.org/www-project-modsecurity-core-rule-set/
7070[ modsec ] : https://owasp.org/www-project-modsecurity/
7171[ modsec-docs ] : https://www.modsecurity.org/
7272[ spotlight03 ] : https://youtu.be/88ZMKpiZbRI
0 commit comments