Skip to content
Cloudflare Docs

Configure in the dashboard

The Cloudflare OWASP Core Ruleset is Cloudflare's implementation of the OWASP ModSecurity Core Rule Set (CRS). It is designed to work as a single entity to calculate a threat score and execute an action based on that score.

Deploy the Cloudflare OWASP Core Ruleset

  1. In the Cloudflare dashboard, go to the Security Settings page.

    Go to Settings
  2. (Optional) Filter by Web application exploits.

  3. Turn on OWASP core ruleset.

  4. Review the deployment settings. Edit the scope, if necessary, to apply the ruleset to a subset of the incoming requests, or configure any custom settings (also known as overrides).

  5. Select Save.

This operation deploys the managed ruleset for the current zone, creating a new rule with the Execute action.

Configure in the dashboard

You can configure (or override) the Cloudflare OWASP Core Ruleset, overriding its default configuration, at several levels:

More specific configurations (rule and tag level) have greater priority than less specific configurations (ruleset level).

Ruleset-level configuration

You can configure (or override) the following Cloudflare OWASP Core Ruleset settings in the Cloudflare dashboard:

  • Scope: When you specify a custom filter expression, the Cloudflare OWASP Core Ruleset applies only to a subset of the incoming requests. By default, a managed ruleset deployed in the dashboard applies to all incoming traffic.
  • Paranoia level: The paranoia level (PL) classifies OWASP rules according to their aggressiveness, varying from PL1 to PL4, where PL4 is the most strict level. The available levels are:
    • PL1 (default)
    • PL2
    • PL3
    • PL4
  • Score threshold: The score threshold (or anomaly threshold) defines the minimum cumulative score — obtained from matching OWASP rules — for the WAF to apply the configured OWASP ruleset action. The available thresholds are:
    • Low - 60 and higher
    • Medium - 40 and higher (default)
    • High - 25 and higher
  • OWASP action: The action to perform when the calculated request threat score is greater than the score threshold. The available actions are: Managed Challenge, Block, JS Challenge, Interactive Challenge, and Log.
  • Payload logging: When enabled, logs the request information (payload) that triggered a specific rule of the managed ruleset. You must configure a public key to encrypt the payload.

Once you have deployed the Cloudflare OWASP Core Ruleset, do the following to configure it in the dashboard:

  1. In the Cloudflare dashboard, go to the Security rules page.

    Go to Security rules
  2. (Optional) Filter by Managed rules.

  3. Search for Cloudflare OWASP Core Ruleset. Look for a rule with an Execute action.

  4. Select the rule name (containing the name of the managed ruleset) to open the deployment configuration page.

  5. (Optional) To execute the Cloudflare OWASP Core Ruleset for a subset of incoming requests, select Edit scope and configure the expression that will determine the scope of the current rule deploying the managed ruleset.

  6. In the ruleset configuration section, define settings for all the rules in the Cloudflare OWASP Core Ruleset by setting one or more fields using the drop-down lists.

    For example, select the action to perform for all the rules in the ruleset.

    The Configure deployment page displaying the available options to override all the rules in the OWASP Core Ruleset: OWASP Anomaly Score Threshold, OWASP Paranoia Level, and OWASP Action.
  7. Select Save.

Tag-level configuration

You can configure (or override) the following setting in the dashboard for OWASP Core Ruleset rules tagged with at least one of the selected tags:

  • Rule status: Sets the rule status (enabled or disabled) for all the rules with the selected tags. To remove the action override at the tag level, set the action to Default.

Once you have deployed the Cloudflare OWASP Core Ruleset, do the following to configure rules with specific tags in the dashboard:

  1. In the Cloudflare dashboard, go to the Security rules page.

    Go to Security rules
  2. (Optional) Filter by Managed rules.

  3. Search for Cloudflare OWASP Core Ruleset. Look for a rule with an Execute action.

  4. Select the rule name (containing the name of the managed ruleset), and then select Browse rules.

    The Cloudflare dashboard displaying the list of rules in the Cloudflare OWASP Core Ruleset.
  1. Select one or more tags under the search input to filter the rules with those tags, and then select the checkbox in the top left corner of the table to select all the rules shown in the current page.
    If not all the rules are displayed in the current page, extend your selection to all rules with the selected tags across all pages by selecting Select all <NUMBER> rules.

    The Configure deployment page displaying selected rules with the 'attack-xss' tag in the Cloudflare OWASP Core Ruleset.
  2. Update one or more settings for the selected rules using the buttons displayed in the top right corner of the table (for example, Set status).

  3. Select Next.

  4. A dialog appears asking you if any new rules with the selected tags should be configured with the field values you selected.

    • Select Include new rules if you want to apply your configurations to any new rules with the select tags.
    • Select Only selected rules to apply your configurations to the selected rules only.
  5. Select Save.

Rule-level configuration

You can configure (or override) the following setting in the dashboard for the selected OWASP Core Ruleset rules:

  • Rule status: Sets the status (enabled or disabled) of a single rule or, if you select multiple rules, for the selected rules.

Once you have deployed the Cloudflare OWASP Core Ruleset, do the following to configure individual ruleset rules in the dashboard:

  1. In the Cloudflare dashboard, go to the Security rules page.

    Go to Security rules
  2. (Optional) Filter by Managed rules.

  3. Search for Cloudflare OWASP Core Ruleset. Look for a rule with an Execute action.

  4. Select the rule name (containing the name of the managed ruleset), and then select Browse rules.

    The Cloudflare dashboard displaying the list of rules in the Cloudflare OWASP Core Ruleset.
  1. Search for rules using the available filters.

  2. In the results list, change the values for each rule as desired, using the displayed drop-down lists and toggles. For example, change the status of a rule using the Status toggle next to the rule.

    To configure multiple rules with the same value, select the checkboxes for all the rules you want to configure. If not all the rules are displayed in the current page, you can extend your selection to all rules across all pages by selecting Select all <NUMBER> rules. Then, use the buttons displayed in the top right corner of the table — for example, Set status — to update one or more fields for the selected rules.

    The Configure deployment page displaying selected rules in the Cloudflare OWASP Core Ruleset.
  3. Select Next, and then select Save.