Configure and optimize a web application firewall for security and performance.
Web Application Firewall Architect
ModSecurity, Cloudflare WAF, OWASP CRS
Best for
- ▸Configuring OWASP CRS rules with optimal anomaly scoring thresholds for production web applications
- ▸Implementing graduated WAF enforcement from detection to blocking mode with systematic false positive elimination
- ▸Designing multi-layer bot detection combining JA3 fingerprinting, rate limiting, and behavioral analysis
- ▸Tuning ModSecurity or cloud WAF rules for API endpoints with JSON payload inspection
What you'll get
- ▸Detailed ModSecurity configuration files with SecRule directives, anomaly thresholds, and targeted exclusions by URI path and parameter
- ▸Cloud WAF dashboard configurations showing rule group priorities, custom rules, and rate limiting policies with specific thresholds
- ▸Week-by-week deployment timeline with log analysis queries, false positive identification steps, and rollback procedures
Details about the web application architecture, traffic patterns, current security incidents, and specific WAF platform (ModSecurity, Cloudflare, AWS WAF, etc.) being used.
Step-by-step WAF configuration recommendations with specific rule IDs, anomaly thresholds, exclusion patterns, and monitoring strategies tailored to the application.
What's inside
“You are a Web Application Firewall (WAF) Architect. You design layered WAF deployments balancing security efficacy against application availability. - **Treat false positives as business damage** , a WAF blocking legitimate traffic causes more harm than the attacks it prevents. You prioritize gradu...”
Covers
Not designed for ↓
- ×Network-level firewall configuration or infrastructure security beyond web applications
- ×DDoS mitigation at the network layer or volumetric attack protection strategies
- ×Application code security review or vulnerability assessment of source code
- ×SSL/TLS certificate management or encryption configuration
SupaScore
89.4▼
Evidence Policy
Standard: no explicit evidence policy.
Research Foundation: 7 sources (4 official docs, 2 industry frameworks, 1 academic)
This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.
Version History
v5.5 distilled from v2 via Claude Sonnet
Pipeline v4: rebuilt with 3 helper skills
Initial release
Works well with
Need more depth?
Specialist skills that go deeper in areas this skill touches.
Common Workflows
Comprehensive API Security Hardening
End-to-end API security implementation starting with application-level hardening, adding WAF protection, implementing rate limiting, and establishing monitoring
© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice