Yandex Cloud
Search
Contact UsGet started
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • AI for business
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
© 2025 Direct Cursus Technology L.L.C.
Yandex Smart Web Security
  • Getting started
    • All guides
    • Address lists
    • Viewing operations
    • Configuring monitoring
    • Setting up alerts
    • Configuring logs via Smart Web Security
    • Configuring logs via Application Load Balancer
    • Migrating to WAF with support for Yandex rules
    • Overview
    • Security profiles
    • WAF
    • ARL (request limit)
    • Rules
    • Conditions
    • Lists
    • Protecting domains
    • Logging
    • Quotas and limits
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • Release notes
  1. Step-by-step guides
  2. Migrating to WAF with support for Yandex rules

Migrating to WAF with Yandex rule set support

Written by
Yandex Cloud
Updated at September 24, 2025

Web Application Firewall analyzes requests to your resources using rule sets. Previously, only one rule set was available: OWASP Core Ruleset. Starting September 9, 2025, two new rule sets developed by Yandex are also available: Yandex Ruleset and ML WAF (Yandex Malicious Score).

To support new rule sets, the coreRuleSet object in the WAF interfaces will get a mandatory field: ruleSet.type. The coreRuleSet section will be nested into the ruleSet section, which sets the priority for processing a request by a rule set.

The type field may get the following values:

  • CORE: OWASP Core rule set.
  • YA: Yandex rule set.
  • ML: ML WAF (Yandex Malicious Score) rule set.

By default, the type field will have the RULE_SET_TYPE_UNSPECIFIED value, which means the requests will not be checked by any rule set.

To continue working with WAF, add this new field to the API function calls or Terraform manifest. In the management console, you will not to do anything, since all changes will be applied automatically.

Warning

Starting September 9, 2025, the type field will become mandatory, while the ruleSet description will be only accepted in the new format. The previous format will no longer be supported.

Terraform
API REST
API gRPC
rule_set {
  action     = "DENY"
  is_enabled = true
  priority   = 1

  core_rule_set {
    inbound_anomaly_score = 2
    paranoia_level        = local.waf_paranoia_level

    rule_set {
      name    = "OWASP Core Ruleset"
      type    = "CORE"
      version = "4.0.0"
    }
  }
}
"coreRuleSet": {
  "inboundAnomalyScore": 2,
  "paranoiaLevel": 2,
  "ruleSet": {
    "name": "OWASP Core Ruleset",
    "type": "CORE",
    "version": "4.0.0"
  }
}

For more information, see the update REST API method description for the WafProfile resource.

"core_rule_set": {
  "inbound_anomaly_score": 2,
  "paranoia_level": 2,
  "rule_set": {
    "name": "OWASP Core Ruleset",
    "version": "4.0.0",
    "type": "CORE"
  }
}

For more information, see the WafProfile/Update gRPC API call description.

See alsoSee also

  • Configuring WAF rule sets
  • Editing basic WAF profile settings

Was the article helpful?

Previous
Configuring logs via Application Load Balancer
Next
All tutorials
© 2025 Direct Cursus Technology L.L.C.