Platform.sh is now Upsun. Click here to learn more
Upsun User Documentation

Fastly WAF

Try Upsun for 15 days
After that, enjoy the same game-changing Upsun features for less with the First Project Incentive!¹ A monthly $19 perk!
Activate your 15-day trial
¹Terms and conditions apply

On top of the Upsun Web Application Firewall (WAF), you can subscribe to the Fastly Next-Gen Web Application Firewall (Next-Gen WAF) to further protect your app from security threats.

Available offers Anchor to this heading

If you want to subscribe to the Fastly Next-Gen WAF through Upsun, you can choose from two offers:

  • If you subscribe to the Basic offer, your WAF is fully managed by Upsun.
  • If you subscribe to the Basic configurable offer, your WAF is fully managed by Upsun too, but with additional flexibility and visibility provided.

To view a list of all the features included in each offer, see the following table.

Capability Basic offer Basic configurable offer
Available modes Block mode only Block, not blocking, off modes
Default attack signals Yes Yes
Default anomaly signals Yes Yes
Virtual patching No Yes, in block mode only
Default dashboards No During quarterly business reviews
Custom response codes No No
Custom signals No No
Standard API & ATO signals No No

To subscribe to a Fastly Next-Gen WAF offer through Upsun, contact Sales.

Next-Gen WAF Tier Comparison Anchor to this heading

Basic Anchor to this heading

  • Block-only mode
  • Default attack and anomaly signals enabled
  • No virtual patching
  • No default dashboards
  • No custom signals, response codes, or API/ATO signals

This tier is best suited for baseline protection with minimal configuration requirements.

Basic Configurable Anchor to this heading

  • Block, not blocking, and off modes
  • Default attack and anomaly signals enabled
  • Virtual patching available in block mode
  • Default dashboards reviewed during quarterly business reviews
  • No custom signals, response codes, or API/ATO signals

This tier is best for customers needing custom rules, CVE protection, per-project visibility, or log integration.

How the Fastly Next-Gen WAF Works Anchor to this heading

The Fastly Next-Gen WAF evaluates incoming requests using a combination of signals, conditions, actions, and thresholds.

Signals Anchor to this heading

Signals classify and tag requests based on observed patterns, such as:

  • SQL injection attempts
  • Cross-site scripting payloads
  • Repeated 404 requests
  • Known attack signatures

Signals are informational and are not inherently “good” or “bad”.

Conditions Anchor to this heading

Conditions define where and when a rule applies. Examples include:

  • Specific URL paths
  • Request methods
  • Geographic origin
  • Presence of certain signals

Actions Anchor to this heading

Actions define what happens when a rule matches (allow/log apply to the configurable offer):

  • Block the request
  • Allow the request
  • Log the request for analysis

Thresholds Anchor to this heading

Thresholds define volume-based triggers. For example, block if more than N suspicious requests occur from the same IP within a defined time window to distinguish normal user behaviour from automated probing or attacks.

Virtual Patching Anchor to this heading

Virtual patches are temporary WAF rules provided by Fastly to block known CVEs at the edge. They:

  • Protect against specific, identified vulnerabilities
  • Buy time while application dependencies are patched
  • Do not replace proper application updates

Scope and Limitations Anchor to this heading

The Fastly Next-Gen WAF mitigates many common web-based attacks, including parts of the OWASP Top 10. However, it does not replace application-level security. The WAF does not automatically protect against:

  • Weak authentication or password policies
  • Insecure application design
  • Business-logic flaws
  • All bot or scraper traffic
  • All DDoS attack types

Some attacks are mitigated at the CDN network layer, while others require identifiable patterns that can be enforced via WAF or rate-limiting rules.

Configuration and enablement Anchor to this heading

Fastly Next-Gen WAF features are not self-service. Enablement and configuration occur during customer onboarding, or via a Support request after purchase.