Since moving to Kubernetes, I haven’t used or evaluated it there yet, but kudos to the team for continuing to update and improve the project. Keep up the great work!
Kubernetes integration is really awesome, you can use BunkerWeb ingress controller or mix it with an existing ingress controller.
It also exists as a docker container as an nginx reverse proxy with modsecurity extension.
https://coreruleset.org/docs/6-development/6-6-useful_tools/...
Neat to see another use case for NGNIX though!
Had a hard time finding the premium version price, aka pro - saw $170 and thought to myself, I don't know. Then I saw it was a monthly fee.
$1500 per year, and I'm not sure what 10 services even means, for me I'd probably need more, and I wouldn't spend 1500 on it if it was a one time lifetime.
I get that I am not the target market. I just wish it was faster to find that out.
Glad I didn't waste more time looking at the cool features.
While this offers many of the same technical capabilities as Cloudflare, a lot of Cloudflare's value is in having high-level, aggregate insight into threats.
In short, NPM doesn't do any of the stuff listed under Security Features here: https://docs.bunkerweb.io/latest/#security-features
Could someone with a proper background in security confirm or invalidate my suspicion ?
WAFs have a few valid uses in my opinion: "virtual patching" and the ability to create custom rules such as blocking/challenging/rate limiting obviously bad traffic. But the giant rulesets are actively harmful IMO. "Defense in depth" is not a valid justification for doing something actively harmful to both your users and the time budget of your security team.
Most bad actors are looking for easy targets and will move on when seeing minimal defenses. If we want to continue enjoying an open and accessible internet where any client that speaks the protocol can connect, then WAFs are an integral part of maintaining that public service.
Testing and deploying patches takes time probably you cannot just update 10 apps at once with single click.
Deploying WAF rule should cover that.
WAFs in and of themselves provide virtually zero security. They can block naive attacks -- catching the most obvious payloads -- and act as an early-warning signal that an attack may be underway (though the SNR on this is awful). But frankly, this is far less important in practice than the fact that it just makes things more difficult and annoying for attackers. Enough so that it can make a semi-attractive target into a no-go.
This is like defense-in-depth, but instead of layering protections in place so that the holes in the swiss cheese don't like up, you're making the cheese smell awful enough to ignore the juicy apple behind it.
If you're a valuable enough target, they're gonna go for the apple regardless of how bad the cheese is. ... And this analogy may have gotten away from me.