Skip to main content

How to write an RFP for WAF and application security

Requirements, questions, and evaluation criteria specific to WAF and application security procurement

7 min read

Web application firewalls and application security are critical for protecting applications and APIs from a constantly evolving threat landscape. RFPs are essential for evaluating the complex features, deployment options, and threat intelligence capabilities required to defend against modern cyberattacks.

What makes WAF and application security RFPs different

Securing web applications and APIs requires a multi-layered approach that goes beyond traditional network security. WAAP solutions must address vulnerabilities such as SQL injection, cross-site scripting, and API abuse, while also mitigating bot traffic and DDoS attacks.

The dynamic nature of application development and deployment, including the use of microservices, cloud-native architectures, and third-party APIs, adds complexity to the selection process.nnRegulatory compliance, such as PCI DSS, GDPR, and industry-specific mandates, also influences RFP requirements. Organizations must ensure that the chosen solution meets these compliance obligations and provides adequate data protection.

The increasing use of AI in cyberattacks necessitates advanced security measures, such as behavioral analysis and machine learning, which should be thoroughly evaluated in the RFP.nnFinally, the integration of security into the DevOps pipeline (DevSecOps) is crucial for modern application security. The RFP should address the vendor's ability to integrate with CI/CD tools and provide APIs for automation and orchestration.

  • The ability to protect against OWASP Top 10 vulnerabilities and emerging threats.
  • Integration with existing security infrastructure and DevOps workflows.
  • Scalability and performance to handle high traffic volumes and complex applications.
  • Compliance with relevant industry regulations and data privacy standards.

RFP vs RFI vs RFQ

Here's when to use each document type when procuring WAF and application security software.

RFI

Request for Information

Use early in your search to understand what vendors offer and narrow your list. Gather general capabilities, company background, and high-level pricing ranges.

RFP

Request for Proposal

Use when you know your requirements and want detailed vendor solutions and pricing. This is your main evaluation document for shortlisted vendors.

RFQ

Request for Quote

Use when requirements are fixed and you just need final pricing. Often used after RFP when you're ready to negotiate with finalists.

When procuring WAF and application security solutions, an RFI can help gather initial information about different vendors and their offerings. However, an RFP is necessary to evaluate specific technical requirements, deployment options, and pricing models, while an RFQ is generally not suitable due to the complexity and customization involved.

Technical requirements checklist

Use this checklist when defining your RFP scope.

Core Security Features

  • OWASP Top 10 protection
  • SQL injection and XSS prevention
  • DDoS mitigation (Layers 3, 4, and 7)
  • Bot management and mitigation
  • API security and protection

API Security

  • Automated API discovery
  • API schema validation
  • Broken Object Level Authorization (BOLA) protection
  • API rate limiting and throttling
  • Anomaly detection for API traffic

Deployment Options

  • Cloud-based deployment
  • On-premise deployment
  • Hybrid deployment
  • Integration with Kubernetes and service meshes
  • Support for multiple cloud providers (AWS, Azure, GCP)

Threat Intelligence

  • Real-time threat intelligence feeds
  • Integration with threat intelligence platforms
  • Reputation-based blocking
  • Zero-day vulnerability protection
  • Customizable threat rules

Reporting and Analytics

  • Real-time monitoring and alerting
  • Detailed security reports and dashboards
  • Integration with SIEM systems
  • Customizable reporting options
  • Forensic analysis capabilities

Questions to include in your RFP

Architecture & Deployment

  • Describe your solution's architecture, including all components and their functions.
    Understanding the architecture is critical for assessing scalability and integration capabilities.
  • What deployment options are available (cloud, on-premise, hybrid)?
    Ensures the solution aligns with the organization's infrastructure strategy.
  • How does your solution integrate with CI/CD pipelines and DevOps workflows?
    Essential for automating security and reducing friction in the development process.
  • Describe your solution's scalability and performance characteristics.
    Ensures the solution can handle peak traffic and growing application demands.

Threat Detection & Mitigation

  • What types of attacks can your solution detect and mitigate (OWASP Top 10, bot attacks, DDoS, API attacks)?
    Verifies comprehensive protection against common and emerging threats.
  • How does your solution use threat intelligence to identify and block malicious traffic?
    Ensures proactive defense against known and emerging threats.
  • Describe your solution's behavioral analysis and anomaly detection capabilities.
    Critical for identifying and blocking zero-day attacks and sophisticated threats.
  • How does your solution protect against API vulnerabilities, such as BOLA and injection attacks?
    APIs are a major attack vector, requiring specialized security measures.

Bot Management

  • How does your solution differentiate between legitimate users and malicious bots?
    Ensures accurate bot detection and mitigation without blocking legitimate traffic.
  • What techniques does your solution use to mitigate bot traffic (e.g., CAPTCHA, rate limiting, device fingerprinting)?
    Evaluates the effectiveness of bot mitigation strategies.
  • Can your solution customize bot detection and mitigation rules based on specific application needs?
    Provides flexibility to address unique bot-related challenges.
  • Does your solution provide reporting and analytics on bot traffic?
    Provides visibility into bot activity and its impact on application performance.

Reporting & Analytics

  • What types of reports and dashboards does your solution provide?
    Ensures comprehensive visibility into security events and application performance.
  • Can your solution integrate with SIEM systems and other security tools?
    Enables centralized security monitoring and incident response.
  • How customizable are the reports and dashboards?
    Provides flexibility to tailor reporting to specific business needs.
  • Does your solution provide forensic analysis capabilities?
    Essential for investigating security incidents and identifying root causes.

Compliance

  • Does your solution comply with relevant industry regulations (e.g., PCI DSS, HIPAA, GDPR)?
    Ensures adherence to legal and regulatory requirements.
  • Can your solution provide evidence of compliance (e.g., audit reports, certifications)?
    Verifies the vendor's commitment to compliance.
  • How does your solution help organizations meet data privacy requirements?
    Critical for protecting sensitive data and maintaining customer trust.
  • Describe your solution's data residency and localization capabilities.
    Important for organizations with specific data sovereignty requirements.

Support & SLAs

  • What levels of support are offered (e.g., 24/7, business hours)?
    Ensures timely assistance in case of security incidents or technical issues.
  • What are your service level agreements (SLAs) for uptime, response time, and resolution time?
    Sets clear expectations for performance and reliability.
  • Describe your onboarding and training process.
    Facilitates a smooth transition and ensures effective use of the solution.
  • What documentation and resources are available?
    Provides self-service options for troubleshooting and learning about the solution.

Compliance and security requirements

Depending on your industry, you may need to require proof of these certifications and standards.

PCI-DSS

Required if handling payment card data. If applicable, request current PCI-DSS compliance certificate and AOC.

HIPAA

Required for healthcare data. If applicable, request BAA template and HIPAA compliance documentation.

GDPR

Required if processing personal data of eu citizens. If applicable, request information on GDPR compliance measures, including data protection policies and procedures.

SOC 2 Type II

Required for saas providers and organizations handling sensitive data. If applicable, request SOC 2 Type II audit report.

Evaluation criteria

Here is the suggested weighting for WAF and application security RFPs.

Functionality Fit How well the solution meets stated requirements.
25%
Threat Detection Accuracy Effectiveness in identifying and blocking malicious traffic with minimal false positives.
20%
Scalability & Performance Ability to handle high traffic volumes without impacting application performance.
15%
Integration Capabilities Ease of integration with existing security infrastructure and DevOps workflows.
15%
Total Cost of Ownership Implementation, licensing, and ongoing costs.
10%
Vendor Support & SLAs Quality of support services and defined service level agreements.
10%
Reporting and Analytics Comprehensive reporting and analytics capabilities for security monitoring and incident response.
5%

Some weights were adjusted based on your priorities.

  • Increase if replacing a highly customized legacy system.
  • Increase for highly sensitive applications.
  • Increase for applications with unpredictable traffic patterns.
  • Increase if complex integration landscape exists.
  • Increase for organizations lacking in-house security expertise.

Red flags to watch

  • Vague pricing responses

    Vendors who can't provide clear pricing often have hidden costs or complex fee structures that inflate TCO.

  • No customer references in your industry

    Lack of relevant references suggests limited experience with your specific requirements and use cases.

  • Poor support SLAs

    Insufficient support SLAs indicate a lack of commitment to timely assistance and problem resolution.

  • Limited API visibility

    A WAF without automated API discovery is effectively obsolete in modern application environments.

  • No false positive guarantee

    Expect operational pain if a vendor cannot provide data on false positive rates or offers no SLA on keeping them low.

Key metrics to request

Ask vendors to provide benchmarks from similar customers.

Implementation timeline for similar customers

Helps set realistic expectations and identify potential delays.

Average time to first value

Indicates how quickly you'll see ROI from the investment.

False positive rate in production

Measures the accuracy of threat detection and the impact on legitimate traffic.

Mean time to detect (MTTD) and mean time to respond (MTTR)

Indicates the speed and effectiveness of incident response capabilities.

Percentage of traffic scrubbed

Demonstrates the effectiveness of the solution in blocking malicious traffic.