Creating a security profile
Note
To enhance your security, we use HTTP request data to train our machine learning (ML) models. You can disable the use of this data in the management console
To work with a security profile that connects to a load balancer, you will need a service account with the monitoring.editor, smart-web-security.admin, certificate-manager.admin, and logging.writer roles. For more information, see Assigning roles to a service account.
-
In the management console
, select the folder where you want to create your security profile. -
In the list of services, select Smart Web Security.
-
Click Create profile.
-
Select one of these creation options:
-
From a preset template: This is a recommended option.
A preset profile includes:
- Basic default rule enabled for all traffic with the
Allowaction type. - Smart Protection rule,
sp-rule-1, enabled for all traffic with theFull protectionaction type.
- Basic default rule enabled for all traffic with the
-
From scratch. This profile includes only the basic default rule enabled for all traffic.
-
-
Name the profile.
-
Optionally, provide a description.
-
Optionally, add labels to your profile.
-
In the Action for the default base rule field, select what to do with traffic that does not match any other rule:
DenyorAllow. -
Select or create an ARL profile to limit the number of requests.
-
Select or create a Yandex SmartCaptcha to verify suspicious requests:
-
Default: Managed by Yandex Cloud. This CAPTCHA has the following settings:- Main challenge: Checkbox.
- Additional challenge:
Silhouettes. - Additional challenge difficulty: Easy.
- Appearance: Standard.
The
DefaultCAPTCHA usage fee is included in the cost of Smart Web Security. -
Custom CAPTCHA: You can customize CAPTCHA's difficulty, types of main and additional challenges, and appearance.Note
To use a custom CAPTCHA, select Disable domain verification in its settings.
The custom CAPTCHA usage fee is charged according to the SmartCaptcha pricing policy.
-
-
Optionally, configure the Analyze request body (maximum size: 8 KB) option by selecting an action after the maximum size is exceeded:
Do not analyze bodyBlock request
-
Optionally, enable Write logs and configure logging:
- In the Send logs to field, select the logs to write: Cloud Logging and Audit Trails.
- For Cloud Logging, select or create a Cloud Logging log group to store your logs.
- For logging, you can choose only those requests that triggered:
- Base rules.
- Smart Protection rules.
- Web Application Firewall rules.
- Advanced Rate Limiter rules.
- All selected rules applied the DENY and CAPTCHA action (verdict).
- All selected rules applied the ALLOW action (legitimate requests).
For more information on how to configure logging, see this guide.
-
Click
Add rule. -
In the rule creation window:
-
Name the rule.
-
Optionally, provide a description.
-
Set the rule priority. The rule you add will have a higher priority than the preconfigured rules.
Note
The smaller the value, the higher is the rule priority. The priorities for preconfigured rules are as follows:
- Basic default rule:
1000000. - Smart Protection rule providing full protection:
999900.
- Basic default rule:
-
Optionally, enable Only logging (dry run) if you want only to log data about the traffic matching the specified conditions without applying any actions to it.
-
Select the rule type:
-
Base: Allows, denies, or forwards traffic to Yandex SmartCaptcha under specified conditions.
-
Smart Protection: Sends traffic for automatic processing by machine learning and behavioral analysis algorithms and redirects suspicious requests to Yandex SmartCaptcha for additional verification.
-
Web Application Firewall: Integrates rules from a WAF profile and redirects suspicious requests to Yandex SmartCaptcha.
For a WAF rule, select or create a WAF profile.
-
-
Select an action:
-
For a basic rule:
Deny.Allow.Show CAPTCHA: To show the CAPTCHA selected in the security profile.
-
For a Smart Protection or WAF rule:
Full protection: To redirect suspicious requests to SmartCaptcha after verification.API protection: To block suspicious requests after verification.
-
-
Under Conditions for traffic, specify the traffic the rule will apply to:
-
All traffic: Rule will apply to all traffic. -
On condition: Rule will apply to the traffic defined in the Conditions field:IP: IP address, IP address range, IP address region, or address list.HTTP header: HTTP header string.Request URI: Request path.Host: Domain receiving the request.HTTP method: Request method.Cookie: Cookie header string.
You can set multiple conditions by selecting all the condition types you need in the Conditions field.
You can also set multiple conditions of the same type by clicking
and or or in the section with the condition you need.To delete a condition, click
.
-
-
Click Add.
-
-
If the
Denyaction is set for the default basic rule and the requests are sent to SmartCaptcha for verification, add an allowing rule. -
Add all relevant rules to the profile one by one.
The rules you created will appear in the table under Security rules.
-
Optionally, enable or disable the use of HTTP request info to improve your machine learning models under Fine-tuning ML models.
-
Click Create.
If you do not have the Yandex Cloud CLI installed yet, install and initialize it.
By default, the CLI uses the folder specified when creating the profile. To change the default folder, use the yc config set folder-id <folder_ID> command. You can also set a different folder for any specific command using the --folder-name or --folder-id parameter.
-
View the description of the CLI command for creating a security profile:
yc smartwebsecurity security-profile create --help -
To create a security profile, run this command:
yc smartwebsecurity security-profile create \ --name <security_profile_name> \ --description "<profile_description>" \ --labels <label_1_key>=<label_1_value>,<label_2_key>=<label_2_value>,...,<label_n_key>=<label_n_value> \ --default-action <action> \ --captcha-id <CAPTCHA_ID> \ --security-rules-file <path_to_file_with_rules>Where:
-
--name: Security profile name. This is a required setting. If you specify only the profile name with no other properties, the security profile will include a single basic rule. -
--description: Text description of the security profile. This is an optional setting. -
--labels: List of labels to add to the profile inKEY=VALUEformat. This is an optional setting. For example,--labels foo=baz,bar=baz'. -
--default-action: Action to apply to traffic that does not match any other rule. This is an optional setting. The default value isallow, which allows all requests to Yandex Smart Web Security. To block requests, set the parameter todeny. -
--captcha-id: ID of the CAPTCHA in Yandex SmartCaptcha to verify suspicious requests. This is an optional setting. -
--security-rules-file: Path to the YAML file with security rule description. This is an optional setting. Here is an example:security-rules.yaml
- name: rule-condition-deny description: My first security rule. This rule it's just example to show possibilities of configuration. priority: "11111" dry_run: true rule_condition: action: DENY condition: authority: authorities: - exact_match: example.com - exact_match: example.net http_method: http_methods: - exact_match: GET - exact_match: POST request_uri: path: prefix_match: /search queries: - key: firstname value: pire_regex_match: .ivan. - key: lastname value: pire_regex_not_match: .petr. headers: - name: User-Agent value: pire_regex_match: .curl. - name: Referer value: pire_regex_not_match: .bot. source_ip: ip_ranges_match: ip_ranges: - 1.2.33.44 - 2.3.4.56 ip_ranges_not_match: ip_ranges: - 8.8.0.0/16 - 10::1234:1abc:1/64 geo_ip_match: locations: - ru - es geo_ip_not_match: locations: - us - fm - gb - name: rule-condition-allow description: Let's show how to whitelist IP. priority: "2" rule_condition: action: ALLOW condition: source_ip: ip_ranges_match: ip_ranges: - 44.44.44.44-44.44.44.45 - 44.44.44.77 - name: smart-protection-full description: Enable smart protection. Allow to show captcha on /search prefix. priority: "11" smart_protection: mode: FULL condition: request_uri: path: prefix_match: /search - name: smart-protection-api description: Enable smart protection with mode API. We are not expect to see captcha on /api prefix. priority: "10" smart_protection: mode: API condition: request_uri: path: prefix_match: /api
Result:
id: fev6q4qqnn2q******** folder_id: b1g07hj5r6i******** cloud_id: b1gia87mbaom******** name: my-sample-profile description: "my description" labels: label1=value1,label2=value2 default_action: DENY created_at: "2024-07-25T19:21:05.039610Z" -
For more information about the yc smartwebsecurity security-profile create command, see the CLI reference.
With Terraform
Terraform is distributed under the Business Source License
For more information about the provider resources, see the relevant documentation on the Terraform
If you do not have Terraform yet, install it and configure the Yandex Cloud provider.
-
In the Terraform configuration file, describe the resources you want to create:
resource "yandex_sws_security_profile" "demo-profile-simple" { name = "<security_profile_name>" default_action = "DENY" captcha_id = "<CAPTCHA_ID>" advanced_rate_limiter_profile_id = "<ARL_profile_ID>" # Smart Protection rule security_rule { name = "smart-protection" priority = 99999 smart_protection { mode = "API" } } # Basic rule security_rule { name = "base-rule-geo" priority = 100000 rule_condition { action = "ALLOW" condition { source_ip { geo_ip_match { locations = ["ru", "kz"] } } } } } # WAF profile rule security_rule { name = "waf" priority = 88888 waf { mode = "API" waf_profile_id = "<WAF_profile_ID>" } } }Where:
name: Security profile name.default_action: Action for the default basic rule. This action will apply to traffic that does not match any other rule. It can be eitherALLOWto allow all requests to Yandex Smart Web Security orDENYto deny them.captcha_id: ID of the CAPTCHA in Yandex SmartCaptcha to verify suspicious requests. This is an optional setting.advanced_rate_limiter_profile_id: ARL profile ID. This is an optional setting.security_rule: Security rule description:name: Security rule name.priority: Rule priority. The possible values range from 1 to 1,000,000.smart_protection: Description of the Smart Protection rule enabled for all traffic with the action type specified in themodeparameter.mode: Rule action. It can be eitherFULLto enable full protection, where suspicious requests are challenged with CAPTCHA, orAPIto enable API protection, where suspicious requests are blocked.
waf: Web application firewall rule description. To add a WAF rule, you must first create a WAF profile. The optional setting section contains:waf_profile_id: WAF profile ID.
If you do not specify the
smart_protectionorwafrule type, the system will create a basic rule with simple filtering based on conditions specified underrule_condition.For more information about
yandex_sws_security_profileproperties, see this Terraform provider article. -
Create the resources:
-
In the terminal, go to the directory where you edited the configuration file.
-
Make sure the configuration file is correct using this command:
terraform validateIf the configuration is correct, you will get this message:
Success! The configuration is valid. -
Run this command:
terraform planYou will see a detailed list of resources. No changes will be made at this step. If the configuration contains any errors, Terraform will show them.
-
Apply the changes:
terraform apply -
Type
yesand press Enter to confirm the changes.
-
Terraform will create all the required resources. You can check the new resources using the management console
yc smartwebsecurity security-profile get <security_profile_ID>
Use the create REST API method for the SecurityProfile resource or the SecurityProfileService/Create gRPC API call.