← Back to Skills
SecurityEngineeringPlatinum

Configure and optimize a web application firewall for security and performance.

Web Application Firewall Architect

ModSecurity, Cloudflare WAF, OWASP CRS

expertv5.0

Best for

  • Configuring OWASP CRS rules with optimal anomaly scoring thresholds for production web applications
  • Implementing graduated WAF enforcement from detection to blocking mode with systematic false positive elimination
  • Designing multi-layer bot detection combining JA3 fingerprinting, rate limiting, and behavioral analysis
  • Tuning ModSecurity or cloud WAF rules for API endpoints with JSON payload inspection

What you'll get

  • Detailed ModSecurity configuration files with SecRule directives, anomaly thresholds, and targeted exclusions by URI path and parameter
  • Cloud WAF dashboard configurations showing rule group priorities, custom rules, and rate limiting policies with specific thresholds
  • Week-by-week deployment timeline with log analysis queries, false positive identification steps, and rollback procedures
Expects

Details about the web application architecture, traffic patterns, current security incidents, and specific WAF platform (ModSecurity, Cloudflare, AWS WAF, etc.) being used.

Returns

Step-by-step WAF configuration recommendations with specific rule IDs, anomaly thresholds, exclusion patterns, and monitoring strategies tailored to the application.

What's inside

You are a Web Application Firewall (WAF) Architect. You design layered WAF deployments balancing security efficacy against application availability. - **Treat false positives as business damage** , a WAF blocking legitimate traffic causes more harm than the attacks it prevents. You prioritize gradu...

Covers

What You Do DifferentlyMethodology
Not designed for ↓
  • ×Network-level firewall configuration or infrastructure security beyond web applications
  • ×DDoS mitigation at the network layer or volumetric attack protection strategies
  • ×Application code security review or vulnerability assessment of source code
  • ×SSL/TLS certificate management or encryption configuration

SupaScore

89.4
Research Quality (15%)
9.1
Prompt Engineering (25%)
8.95
Practical Utility (15%)
8.65
Completeness (10%)
9.3
User Satisfaction (20%)
8.8
Decision Usefulness (15%)
9

Evidence Policy

Standard: no explicit evidence policy.

wafweb-application-firewallmodsecuritycloudflare-wafowasp-crsrate-limitingbot-detectionfalse-positive-tuninganomaly-scoringapplication-securityddos-protectionapi-protection

Research Foundation: 7 sources (4 official docs, 2 industry frameworks, 1 academic)

This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.

Version History

v5.03/25/2026

v5.5 distilled from v2 via Claude Sonnet

v2.02/23/2026

Pipeline v4: rebuilt with 3 helper skills

v1.0.02/15/2026

Initial release

Works well with

Need more depth?

Specialist skills that go deeper in areas this skill touches.

Common Workflows

Comprehensive API Security Hardening

End-to-end API security implementation starting with application-level hardening, adding WAF protection, implementing rate limiting, and establishing monitoring

© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice