Skip to content

Commit 769aa83

Browse files
authored
Merge pull request #242 from M4tteoP/nits_crs_links
change core rule set project name to CRS
2 parents 32019f9 + f39052a commit 769aa83

File tree

8 files changed

+26
-26
lines changed

8 files changed

+26
-26
lines changed

_data/draft.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -268,7 +268,7 @@ docs:
268268
- title: '9.3 ModSecurity Web Application Firewall'
269269
url: operations/modsecurity_waf/
270270

271-
- title: '9.4 ModSecurity Core Rule Set'
271+
- title: '9.4 OWASP CRS'
272272
url: operations/modsecurity_core_rule_set
273273

274274
- title: '10. Metrics'

draft/02-toc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ permalink:
111111
9.1 [DevSecOps Guideline](#devsecops-guideline)
112112
9.2 [Coraza Web Application Firewall](#coraza-web-application-firewall)
113113
9.3 [ModSecurity Web Application Firewall](#modsecurity-web-application-firewall)
114-
9.4 [ModSecurity Core Rule Set](#modSecurity-core-rule-set)
114+
9.4 [OWASP CRS](#modSecurity-core-rule-set)
115115

116116
10 **[Metrics](#metrics)**
117117

draft/11-operations/00-toc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Operations generally cover the security practices:
2727
* [Environment Management][sammoem] such as configuration hardening, patching and updating
2828
* [Operational Management][sammoom] which includes data protection and system / legacy management
2929

30-
OWASP projects provide the Core Rule Set that is used for both Coraza and ModSecurity web application firewalls,
30+
OWASP projects provide the CRS that is used for both Coraza and ModSecurity web application firewalls,
3131
which are widely used for data and system management.
3232

3333
Sections:

draft/11-operations/02-coraza.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,15 +18,15 @@ permalink: /draft/operations/coraza_waf/
1818

1919
The [OWASP Coraza][coraza-project] project provides a golang enterprise-grade Web Application Firewall framework
2020
that supports the [ModSecurity][modsec] seclang language
21-
and is completely compatible with the OWASP [Core Rule Set][modcrs] (CRS).
21+
and is completely compatible with the OWASP [CRS][crs].
2222
Coraza is in active development as an OWASP Production code project,
2323
with the first stable version released in September 2021 and several releases since then.
2424

2525
#### What is Coraza?
2626

2727
The [Coraza][coraza] Web Application Firewall framework is used to enforce policies,
2828
providing a first line of defense to stop attack on web applications and servers.
29-
Coraza can be configured using the OWASP [Core Rule Set][modcrs] and also custom policies can be created.
29+
Coraza can be configured using the OWASP [CRS][crs] and also custom policies can be created.
3030

3131
Coraza can be deployed:
3232

@@ -67,7 +67,7 @@ then [submit an issue][issue1102] or [edit on GitHub][edit1102].
6767
[coraza-wasm]: https://github.com/corazawaf/coraza-proxy-wasm
6868
[edit1102]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/11-operations/02-coraza.md
6969
[issue1102]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=content&template=request.md&title=Update:%2011-operations/02-coraza
70-
[modcrs]: https://coreruleset.org/
70+
[crs]: https://coreruleset.org/
7171
[modsec]: https://owasp.org/www-project-modsecurity/
7272

7373
\newpage

draft/11-operations/03-modsecurity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ ModSecurity itself has a long history as an open source project, the first relea
2727
and is widely used as a web application firewall for cloud and on-premises web servers.
2828

2929
The ModSecurity WAF needs to be configured in operational deployments,
30-
and this can be done using the OWASP ModSecurity [Core Rule Set][modcrs].
30+
and this can be done using the OWASP [CRS][crs].
3131

3232
#### Why use ModSecurity?
3333

@@ -43,7 +43,7 @@ or deployed within the web server itself, to provide protection against HTTP att
4343
The rules applied to the HTTP traffic are provided as configuration to ModSecurity,
4444
and these rules allow many different actions to be applied such as blocking traffic, redirecting requests, and many more.
4545
See the documentation for [deploying and running][modsec-docs] ModSecurity,
46-
along with the documentation on configuring ModSecurity with the [Core Rule Set][modcrs].
46+
along with the documentation on configuring ModSecurity with the [CRS][crs].
4747

4848
----
4949

@@ -53,7 +53,7 @@ then [submit an issue][issue1103] or [edit on GitHub][edit1103].
5353
[coraza]: https://coraza.io/
5454
[edit1103]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/11-operations/03-modsecurity.md
5555
[issue1103]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=content&template=request.md&title=Update:%2011-operations/03-modsecurity
56-
[modcrs]: https://coreruleset.org/
56+
[crs]: https://coreruleset.org/
5757
[modsec]: https://owasp.org/www-project-modsecurity/
5858
[modsec-docs]: https://www.modsecurity.org/
5959
[modsec-press]: https://owasp.org/blog/2024/01/09/ModSecurity.html

draft/11-operations/04-modsecurity-crs.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22

3-
title: ModSecurity Core Rule Set
3+
title: OWASP CRS
44
layout: col-document
55
tags: OWASP Developer Guide
66
contributors: Jon Gadsden
@@ -24,35 +24,35 @@ permalink: /draft/operations/modsecurity_core_rule_set/
2424

2525
![CRS logo](../../../assets/images/logos/crs.png "OWASP CRS"){: .image-right }
2626

27-
### 9.4 ModSecurity Core Rule Set
27+
### 9.4 OWASP CRS
2828

29-
The OWASP ModSecurity [Core Rule Set][modcrs-project] (CRS) project is a set of generic attack detection rules
29+
The [OWASP CRS][crs-project] project, formerly known as Core Rule Set, is a set of generic attack detection rules
3030
for use with [ModSecurity][modsec] compatible web application firewalls such as [OWASP Coraza][coraza].
31-
CRS is an OWASP [Flagship tool project][modcrs-project] and can be [downloaded][modcrs-download]
31+
CRS is an OWASP [Flagship tool project][crs-project] and can be [downloaded][crs-download]
3232
for either Apache or IIS/Nginx web servers.
3333

34-
#### What is the Core Rule Set?
34+
#### What is the CRS?
3535

36-
The [Core Rule Set][modcrs] (CRS) are attack detection rules for use with [ModSecurity][modsec],
37-
[Coraza[coraza] and other ModSecurity compatible web application firewalls.
36+
The [CRS][crs] are attack detection rules for use with [ModSecurity][modsec],
37+
[Coraza][coraza] and other ModSecurity compatible web application firewalls.
3838
The CRS aims to protect web applications from a wide range of attacks with a minimum of false alerts.
3939
The CRS provides protection against many common attack categories, including those in the OWASP Top Ten.
4040

4141
#### Why use it?
4242

4343
If an organization is using a Coraza, ModSecurity or compatible Web Application Firewall (WAF)
44-
then it is very likely that the [Core Rule Set][modcrs] is already in use by this WAF.
44+
then it is very likely that the [CRS][crs] is already in use by this WAF.
4545
The CRS provides the policy for the Coraza / Modsecurity engine so that traffic to a web application is inspected
4646
for various attacks and malicious traffic is blocked.
4747

4848
#### How to use it
4949

50-
The use of the Core Rule Set assumes that a ModSecurity, Coraza or compatible WAF has been installed.
50+
The use of the CRS assumes that a ModSecurity, Coraza or compatible WAF has been installed.
5151
Refer to the [Coraza tutorial][coraza-tutorial] or the [ModSecurity][modsec-docs] on how to do this.
5252

53-
To get started with CRS refer to the Core Rule Set [installation instructions][modcrs-download].
53+
To get started with CRS refer to the CRS [installation instructions][crs-download].
5454

55-
The OWASP Spotlight series provides an overview of how to use this Core Rule Set:
55+
The OWASP Spotlight series provides an overview of how to use this CRS:
5656
'Project 3 - [Core Rule Set (CRS) - 1st Line of Defense][spotlight03]'.
5757

5858
----
@@ -64,9 +64,9 @@ then [submit an issue][issue1104] or [edit on GitHub][edit1104].
6464
[coraza-tutorial]: https://coraza.io/docs/tutorials/quick-start/
6565
[edit1104]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/11-operations/04-modsecurity-crs.md
6666
[issue1104]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=content&template=request.md&title=Update:%2011-operations/04-modsecurity-crs
67-
[modcrs]: https://coreruleset.org/
68-
[modcrs-download]: https://coreruleset.org/docs/deployment/install/
69-
[modcrs-project]: https://owasp.org/www-project-modsecurity-core-rule-set/
67+
[crs]: https://coreruleset.org/
68+
[crs-download]: https://coreruleset.org/docs/deployment/install/
69+
[crs-project]: https://owasp.org/www-project-modsecurity-core-rule-set/
7070
[modsec]: https://owasp.org/www-project-modsecurity/
7171
[modsec-docs]: https://www.modsecurity.org/
7272
[spotlight03]: https://youtu.be/88ZMKpiZbRI

draft/11-operations/toc.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,15 +38,15 @@ Operations generally cover the security practices:
3838
* [Environment Management][sammoem] such as configuration hardening, patching and updating
3939
* [Operational Management][sammoom] which includes data protection and system / legacy management
4040

41-
OWASP projects provide the Core Rule Set that is used for both Coraza and ModSecurity web application firewalls,
41+
OWASP projects provide the CRS that is used for both Coraza and ModSecurity web application firewalls,
4242
which are widely used for data and system management.
4343

4444
Sections:
4545

4646
9.1 [DevSecOps Guideline](01-devsecops.md)
4747
9.2 [Coraza Web Application Firewall](02-coraza.md)
4848
9.3 [ModSecurity Web Application Firewall](03-modsecurity.md)
49-
9.4 [ModSecurity Core Rule Set](04-modsecurity-crs.md)
49+
9.4 [OWASP CRS](04-modsecurity-crs.md)
5050

5151
----
5252

draft/toc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ This draft version has the latest contributions to the Developer Guide so expect
115115
9.1 [DevSecOps Guideline](11-operations/01-devsecops.md)
116116
9.2 [Coraza Web Application Firewall](11-operations/02-coraza.md)
117117
9.3 [ModSecurity Web Application Firewall](11-operations/03-modsecurity.md)
118-
9.4 [ModSecurity Core Rule Set](11-operations/04-modsecurity-crs.md)
118+
9.4 [OWASP CRS](11-operations/04-modsecurity-crs.md)
119119

120120
10 **[Metrics](12-metrics/toc.md)**
121121

0 commit comments

Comments
 (0)