WAF++ WAF++
Back to WAF++ Homepage

Security – Definition

What is Security in the WAF++ context?

Cloud Security in WAF++ refers to the state in which an organization has implemented verifiable, technically enforceable protective measures for its cloud infrastructure:

Cloud Security = Protection across all dimensions:
  ├── Identity & Access Management (who is allowed to do what?)
  ├── Encryption (data at rest & in transit)
  ├── Network Security (segmentation, egress control)
  ├── Secrets Management (no hardcoded credentials)
  ├── Vulnerability Management (patches, container scanning)
  ├── Security Monitoring (detection of attacks)
  └── Incident Response (response to incidents)

Security is not the same as:

  • A completed compliance questionnaire without technical implementation

  • A one-time penetration test without subsequent remediation

  • A firewall as the only protective measure (perimeter model)

  • The assumption that the cloud provider handles security completely (Shared Responsibility!)

Security vs. Compliance

A common confusion: Compliance is not Security, and Security is not Compliance.

Security Compliance

Goal

Protection against actual threats

Fulfillment of regulatory requirements

Measure

Effectiveness of protective measures

Conformity with norms and laws

Approach

Risk-based, adaptive

Rule-based, documented

Measurement

MTTD, MTTR, vulnerability density, patch compliance

Audit results, certificates, evidence

Relationship

Security can produce compliance as a by-product

Compliance without security does not protect

WAF++ follows a Security-First approach: controls are selected primarily by protective effectiveness, not by audit compatibility. Regulatory mappings (ISO 27001, BSI C5, GDPR) are secondary attributes of the controls.

An organization that fully implements all WAF-SEC controls automatically satisfies large parts of the requirements of ISO 27001:2022, BSI C5:2020 and GDPR Art. 32.

The WAF++ Security Spectrum

Security is not a binary state. It exists on a spectrum from reactive to proactive:

Level Label Characteristics

Reactive

Ad-hoc Security

Security is only improved after incidents. No systematic controls. No monitoring. Manual processes. No separation of permissions. Passwords in plaintext.

Basic Protection

Documented & Defined

Security policies exist and are documented. Basic encryption active. MFA for admins. But: little automated checking, no continuous monitoring.

Enforced

Enforced & Monitored

Security controls technically enforced (IaC validation, CI gates). Monitoring active. CMK for sensitive data. Least privilege enforced. Vulnerability scans automated.

Measured

Measured & Automated

Security metrics continuously captured. Automated threat detection. SIEM in use. Policy-as-Code in CI/CD. Incident response playbooks tested.

Proactive

Optimized & Continuously Improved

Threat modeling for new features. Auto-remediation on findings. Red team exercises. Zero trust fully implemented. Continuous compliance evidence pipeline.

The Six Security Core Domains

1. Identity & Access Management (IAM)

IAM is the foundation of all cloud security. Anyone who gains access without authentication or with excessive permissions can undermine all other controls.

WAF++ addresses IAM with two dedicated controls:

  • WAF-SEC-010 – Baseline: MFA, no root usage, IAM password policy

  • WAF-SEC-020 – Least Privilege: no wildcard policies, RBAC, JIT access

2. Encryption

Encryption protects data even when access controls fail. WAF++ distinguishes:

  • Encryption at Rest (WAF-SEC-030): CMK for sensitive data, KMS rotation, no unencrypted volumes or databases

  • Encryption in Transit (WAF-SEC-040): TLS 1.2+, no outdated protocols, certificate management

3. Network Security

Network segmentation limits lateral movement of attackers. WAF++ requires:

  • Private-by-default VPC design

  • Granular security groups (no 0.0.0.0/0)

  • NACLs as a second layer of defense

  • VPC endpoints instead of public internet routes for cloud services

WAF-SEC-050 operationalizes these requirements.

4. Secrets Management

Hardcoded credentials in IaC code, container images or CI/CD pipelines are one of the most common attack sources. WAF-SEC-060 requires:

  • No secrets in Terraform code, ENV variables or Git repositories

  • Secret rotation (automatic where possible)

  • Use of AWS Secrets Manager, Parameter Store or Vault

5. Vulnerability Management

Unpatched software is an invitation to attackers. WAF-SEC-070 defines:

  • Container image scanning (ECR, Trivy, Grype)

  • Patch SLAs by CVSS score

  • SBOM generation for auditable traceability

6. Monitoring, Policy-as-Code & Incident Response

Security monitoring detects attacks that have overcome all other controls. Three controls cover this domain:

  • WAF-SEC-080 – Threat Detection: GuardDuty, CloudTrail, SIEM

  • WAF-SEC-090 – Policy-as-Code: OPA, wafpass in CI/CD

  • WAF-SEC-100 – Incident Response: playbooks, runbooks, exercises

Relationship to Other WAF++ Pillars

Security ──────────────── delivers: IAM, Encryption, Network Controls, Monitoring
Sovereign ──────────────── extends: Jurisdiction, key ownership, exit capability
Governance ─────────────── frames: Policy decisions, audit processes, responsibilities
Operations ─────────────── integrates: Monitoring stack, incident management, change processes
Reliability ────────────── links: Backup security, recovery validation
Cost ────────────────────── uses: Security guardrails for budget protection (no unauthorized deployment)

Security delivers the technical protective measures. Sovereign extends Security with jurisdictional requirements. Governance steers Security through policies and processes.

Target Picture

A security-mature platform (Level 4-5) is characterized by:

  • All privileged accesses are minimal, time-limited, MFA-protected and fully logged

  • All sensitive data is encrypted with CMK, keys rotate automatically

  • No hardcoded secrets in code, IaC or CI/CD

  • Security groups allow only explicitly permitted traffic

  • Container images are checked for CVEs before deployment

  • Security findings automatically trigger alerts and remediation workflows

  • Incident response playbooks are tested and regularly exercised

The target picture depends on maturity level. Not every organization needs Level 5 immediately. Start with the most critical: IAM Baseline (WAF-SEC-010) and Least Privilege (WAF-SEC-020).