Cloud-based WAF service "Scutum"

About Scutum

Scutum is a cloud-based (SaaS) web application firewall (WAF) service that protects customers from web application vulnerabilities such as SQL injection and cross-site scripting. It protects websites that generate dynamic pages in response to requests from malicious attacks

Unlike typical firewalls, it can analyze the contents of data at the application level, providing flexible web application security that can be adapted to everything from small sites to cloud computing environments

Features of Scutum

Cloud-based WAF service "Scutum"

Cloud model (SaaS model) that changes conventional WAF concepts

Conventional WAF solutions are provided as software embedded in hardware appliance servers and are designed to be operated in-house, which places a heavy burden on engineers to maintain stable WAF operation, including the need to make complex configuration changes to servers and networks. As such, while the concept of WAF itself is excellent, it has not yet become widely adopted

Scutum is a cloud-based (SaaS) solution that overcomes the challenges associated with traditional WAFs, and provides web application firewall functionality via the Scutum Center

In addition, the setup can be completed simply by changing the DNS settings so that the IP address that your web server originally has becomes the IP address of the Scutum service, making it possible to build a more secure web service environment without having to own any additional equipment

Key security features

Communications to websites are relayed directly through the Scutum center by changing the DNS, and unauthorized communications are monitored and blocked during this process

1 Blocking feature A function to block communications that appear to be attacks against websites
2 Monitoring Function A function to record communications that appear to be attacks against websites (the communications themselves are not blocked)
3 Defense log viewing function A function that allows you to save and view blocked (monitored) communications as a log
4 Reporting Ability to report the following information on the management screen:
Top 5 attack sources (IP addresses)
, Top 5 attack types
, Monthly defense log downloads
5 Software update function Ability to update software to improve defense effectiveness
6 Defense logic update function A function that constantly updates malicious communication patterns to improve defense effectiveness
7 Specific URL exclusion function A function that allows you to exclude parts of a website that you do not want to protect using the WAF function from the protection target
8 IP address rejection/
permission setting function
A function to deny communication from specific IP addresses or to allow communication only from specific IP addresses
9
IP address management function for vulnerability testing

A function that blocks/does not monitor communications from specified IP addresses when conducting vulnerability assessments on websites.
10 SSL/TLS communication function Ability to decrypt and defend against encrypted communications
11 API Features A function that allows you to obtain defense logs detected by Scutum and detailed attack request information via API

Main attacks that can be defended against

It covers many of the major attacks against vulnerabilities in web applications. Since the defense logic is updated regularly to address new vulnerabilities, customers can maintain the latest security measures without any special effort on their part

Attack Category Attack Name
certification Brute force
Password list attacks
Client-side attacks Cross-site scripting
CSRF (Cross-site request forgery)
*Paid customization available
Execution by command SQL injection
Buffer overflow
OS Command Injection
XPath Injection
Format string attacks
LDAP Injection
SSI injection
Remote File Inclusion
Unsafe Deserialization (Java/PHP)
Information Disclosure Directory indexing
* Customization available for a fee
Information leakage
Path Traversal
Guessing resource locations
Attacks targeting XXE vulnerabilities

Attacks targeting specific middleware/
frameworks
ShellShock attack
Attacks targeting vulnerabilities in Apache Struts2 (such as OGNL injection)
POODLE attack
SSL BEAST attack
HTTP Request Smuggling
Malware distribution Drive-by download attacks (such as virus distribution by Gumblar)
Disruption of Service DoS attacks that exploit platform vulnerabilities (ApacheKiller, hashDoS, etc.)
DoS attacks from a small number of IP addresses (massive normal traffic, Slowloris, SYN flood attacks, etc.)
DDoS attacks from multiple IP addresses
* Paid option available

Administrator Function List

The management functions can be easily and securely accessed via a web browser from the individual management screen on the contracted user's page

1 WAF function control
2 Configuring the Web Server
3 IP address rejection/permission settings
4 SSL/TLS settings (select the SSL/TLS version and cipher suite to allow connections)
5 Log Viewing
6 Renewing an SSL Certificate
7 Exclude URL settings
8 Change your password
9 Change your email address
10 Managing API keys
11 Capture function management
*Optional
Inquiries/Download materials