Skip to content

Commit a4d02bd

Browse files
committed
chore: CRS naming, Coraza link typo
1 parent 32019f9 commit a4d02bd

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

draft/11-operations/04-modsecurity-crs.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -24,35 +24,35 @@ permalink: /draft/operations/modsecurity_core_rule_set/
2424

2525
![CRS logo](../../../assets/images/logos/crs.png "OWASP CRS"){: .image-right }
2626

27-
### 9.4 ModSecurity Core Rule Set
27+
### 9.4 OWASP CRS
2828

29-
The OWASP ModSecurity [Core Rule Set][modcrs-project] (CRS) project is a set of generic attack detection rules
29+
The OWASP CRS[modcrs-project] project is a set of generic attack detection rules
3030
for use with [ModSecurity][modsec] compatible web application firewalls such as [OWASP Coraza][coraza].
3131
CRS is an OWASP [Flagship tool project][modcrs-project] and can be [downloaded][modcrs-download]
3232
for either Apache or IIS/Nginx web servers.
3333

34-
#### What is the Core Rule Set?
34+
#### What is the CRS?
3535

36-
The [Core Rule Set][modcrs] (CRS) are attack detection rules for use with [ModSecurity][modsec],
37-
[Coraza[coraza] and other ModSecurity compatible web application firewalls.
36+
The [CRS][modcrs] are attack detection rules for use with [ModSecurity][modsec],
37+
[Coraza][coraza] and other ModSecurity compatible web application firewalls.
3838
The CRS aims to protect web applications from a wide range of attacks with a minimum of false alerts.
3939
The CRS provides protection against many common attack categories, including those in the OWASP Top Ten.
4040

4141
#### Why use it?
4242

4343
If an organization is using a Coraza, ModSecurity or compatible Web Application Firewall (WAF)
44-
then it is very likely that the [Core Rule Set][modcrs] is already in use by this WAF.
44+
then it is very likely that the [CRS][modcrs] is already in use by this WAF.
4545
The CRS provides the policy for the Coraza / Modsecurity engine so that traffic to a web application is inspected
4646
for various attacks and malicious traffic is blocked.
4747

4848
#### How to use it
4949

50-
The use of the Core Rule Set assumes that a ModSecurity, Coraza or compatible WAF has been installed.
50+
The use of the CRS assumes that a ModSecurity, Coraza or compatible WAF has been installed.
5151
Refer to the [Coraza tutorial][coraza-tutorial] or the [ModSecurity][modsec-docs] on how to do this.
5252

53-
To get started with CRS refer to the Core Rule Set [installation instructions][modcrs-download].
53+
To get started with CRS refer to the CRS [installation instructions][modcrs-download].
5454

55-
The OWASP Spotlight series provides an overview of how to use this Core Rule Set:
55+
The OWASP Spotlight series provides an overview of how to use this CRS:
5656
'Project 3 - [Core Rule Set (CRS) - 1st Line of Defense][spotlight03]'.
5757

5858
----

0 commit comments

Comments
 (0)