Reports incidence statistics – Event logging – GMS and Viewpoint Support 6. What is OWASP Top Ten?
OWASP Top Ten is the top 10 vulnerabilities listed by the OWASP working group. The protection for these vulnerabilities was listed as part of the PCI DSS 6.6 core requirements and has also been adopted by many industries as a compliance standard. The Top Ten vulnerabilities include: – Cross Site Scripting – Injection Flaws, such as SQL injection and OS command injection. – Malicious File Execution – Insecure Direct Object Reference – Cross Site Request Forgery – Information Leakage and Improper Error Handling – Broken Authentication and Session Management – Insecure Cryptographic Storage – Insecure Communications – Failure to Restrict URL Access 7. How do I deploy SonicWALL’s WAF solution? One-Arm Mode Deployment A WAF-enabled SonicWALL SRA appliance is commonly deployed in tandem in “one-arm” mode over the DMZ or Opt interface on an accompanying gateway appliance, for example, a SonicWALL Unified Threat Management (UTM) appliance, such as a SonicWALL NSA E7500 appliance. The primary i