Skip to main content

How to write an RFP for web security

Requirements, questions, and evaluation criteria specific to web security procurement

6 min read

Web security RFPs are crucial due to the sophisticated threat landscape and the potential for significant financial and reputational damage from breaches. A well-defined RFP ensures that the selected Web Application and API Protection (WAAP) solution aligns with an organization's specific security needs and risk profile.

What makes web security RFPs different

Web security RFPs are unique because they require a deep understanding of evolving web architectures, including APIs, cloud-native environments, and AI-driven applications. Traditional security measures are often insufficient, necessitating advanced capabilities like AI-driven behavioral analysis, bot management, and shadow API discovery.

Furthermore, compliance requirements such as PCI DSS and GDPR add complexity, demanding specific features for data protection and log management.nnThe asymmetry of defense—where attackers need only one successful exploit while defenders must secure every endpoint—makes comprehensive RFPs essential. Organizations must evaluate vendors on their ability to not only protect against known threats but also adapt to emerging vulnerabilities and automated attacks.

The integration of security into the CI/CD pipeline (DevSecOps) also requires careful consideration, ensuring minimal developer friction and efficient deployment.

  • Comprehensive API security capabilities, including discovery, schema validation, and protection against BOLA attacks
  • AI-driven behavioral analysis and automated false positive suppression to reduce operational overhead
  • Integration with existing security infrastructure (SIEM, IAM, CI/CD pipelines) for a layered defense
  • Scalability and performance to handle volumetric attacks and minimize latency impact

RFP vs RFI vs RFQ

Here's when to use each document type when procuring web security software.

RFI

Request for Information

Use early in your search to understand what vendors offer and narrow your list. Gather general capabilities, company background, and high-level pricing ranges.

RFP

Request for Proposal

Use when you know your requirements and want detailed vendor solutions and pricing. This is your main evaluation document for shortlisted vendors.

RFQ

Request for Quote

Use when requirements are fixed and you just need final pricing. Often used after RFP when you're ready to negotiate with finalists.

For web security, an RFI is useful for initial market research and understanding available solutions. An RFP is necessary for a detailed evaluation of vendors based on specific requirements and capabilities, while an RFQ is typically not suitable due to the complexity and customization involved in WAAP solutions.

Technical requirements checklist

Use this checklist when defining your RFP scope.

Core Protection

  • OWASP Top 10 protection
  • DDoS mitigation (Layer 3/4 & Layer 7)
  • Bot management
  • SSL/TLS decryption
  • Geo-blocking & IP reputation

API Security

  • API discovery and schema generation
  • Protection against BOLA (Broken Object Level Authorization)
  • Support for REST, GraphQL, and gRPC
  • API rate limiting
  • Input validation and sanitization

AI & Automation

  • AI-driven behavioral analysis
  • Automated false positive suppression
  • AI Security Posture Management (AI-SPM)
  • Machine learning-based threat detection
  • Anomaly detection

Deployment & Architecture

  • Cloud-native deployment options
  • On-premise deployment options
  • Hybrid deployment options
  • Integration with CI/CD pipelines
  • Support for containerized environments (Docker, Kubernetes)

Reporting & Logging

  • Real-time log streaming to SIEM
  • Customizable dashboards and reports
  • Detailed attack forensics
  • Compliance reporting (PCI DSS, GDPR)
  • Alerting and notification capabilities

Questions to include in your RFP

Core Functionality

  • Describe your approach to protecting against the OWASP Top 10 vulnerabilities.
    Ensures the solution covers fundamental web security risks.
  • How does your solution mitigate DDoS attacks at both the network and application layers?
    Verifies the solution can maintain availability during volumetric attacks.
  • Explain your bot management capabilities, including how you distinguish between good and bad bots.
    Assesses the solution's ability to prevent credential stuffing and resource exhaustion.
  • Detail your SSL/TLS decryption process and its impact on performance.
    Confirms the solution can inspect encrypted traffic without significant latency.

API Security

  • Describe your API discovery process and how you handle shadow APIs.
    Ensures comprehensive coverage, including undocumented APIs.
  • How does your solution protect against BOLA (Broken Object Level Authorization) attacks?
    Addresses the most common API vulnerability.
  • What API protocols are supported (REST, GraphQL, gRPC)?
    Confirms compatibility with your API architecture.
  • Explain your API schema validation process and how you prevent parameter tampering.
    Validates the solution enforces API contracts.

AI & Automation

  • Describe your AI-driven behavioral analysis capabilities and how they improve threat detection.
    Assesses the solution's ability to identify anomalies and zero-day attacks.
  • Explain your automated false positive suppression process and its impact on operational efficiency.
    Reduces alert fatigue and minimizes manual tuning.
  • How does your solution integrate AI Security Posture Management (AI-SPM) to govern AI agent interactions?
    Addresses emerging risks associated with AI-driven traffic.
  • How does your solution leverage machine learning to improve threat detection and response?
    Determines the effectiveness of AI in identifying and mitigating threats.

Architecture & Deployment

  • What deployment options are available (cloud, on-premise, hybrid)?
    Ensures flexibility and compatibility with your infrastructure.
  • Describe your integration with CI/CD pipelines and DevSecOps workflows.
    Verifies seamless integration into your development process.
  • How does your solution support containerized environments (Docker, Kubernetes)?
    Confirms compatibility with modern application architectures.
  • What is your approach to high availability and disaster recovery?
    Guarantees continuous protection and minimal downtime.

Reporting & Logging

  • Can logs be streamed in real-time to our SIEM (specify platform)?
    Ensures integration with your existing security infrastructure.
  • Describe your customizable dashboards and reporting capabilities.
    Provides visibility into security posture and threat landscape.
  • What level of detail is provided in your attack forensics reports?
    Supports incident investigation and root cause analysis.
  • Do you provide compliance reports for PCI DSS, GDPR, and other relevant standards?
    Facilitates regulatory compliance and audits.

Pricing & Licensing

  • Describe your pricing model and all associated costs (licensing, support, maintenance).
    Provides transparency and avoids hidden fees.
  • Do you offer "unmetered" DDoS protection or a clause that waives overage fees during recognized attack events?
    Protects against unexpected costs during volumetric attacks.
  • Are there separate charges for bandwidth, request volume, or log egress?
    Identifies potential variable costs that can impact TCO.
  • Do you offer flexible licensing options based on usage or number of applications?
    Ensures scalability and cost-effectiveness.

Compliance and security requirements

Depending on your industry, you may need to require proof of these certifications and standards.

PCI-DSS

Required if handling payment card data. If applicable, request current PCI-DSS compliance certificate and Attestation of Compliance (AOC)

HIPAA

Required for healthcare data. If applicable, request Business Associate Agreement (BAA) template and HIPAA compliance documentation

GDPR

Required for european customer data. If applicable, inquire about data residency options and GDPR compliance measures

SOC 2 Type II

Required for demonstrating security and availability controls. If applicable, request SOC 2 Type II report

Evaluation criteria

Here is the suggested weighting for web security RFPs.

Security Efficacy Ability to accurately detect and block threats with minimal false positives.
35%
Architecture & Deployment Flexibility Ease of deployment and integration with existing infrastructure.
20%
API Security Capabilities Comprehensive API protection features, including discovery and schema validation.
20%
Operational Efficiency Ease of management, automation, and false positive suppression.
15%
Total Cost of Ownership (TCO) Overall cost, including licensing, implementation, and maintenance.
10%

Some weights were adjusted based on your priorities.

  • Increase if a hybrid or multi-cloud environment exists.
  • Increase if internal security resources are limited.

Red flags to watch

  • "Monitor Mode" Forever

    Vendor has been running in "Monitor Mode" (logging only) for an extended period, indicating high false positive rates or lack of confidence in blocking capabilities.

  • Opaque AI

    Vendor cannot explain why a request was blocked by AI, making troubleshooting impossible. Look for "Reason Codes" and transparent logic.

  • Slow Virtual Patching

    Vendor took weeks to provide a managed rule for a critical CVE, indicating under-resourcing or slow response times.

  • Pricing Penalties for Volumetric Attacks

    Vendor charges based on bandwidth or request volume, leading to exorbitant costs during DDoS attacks.

  • Reliance on Manual Swagger Uploads

    Vendor relies on manual uploading of Swagger files for API discovery, indicating a lack of automated API discovery capabilities.

Key metrics to request

Ask vendors to provide benchmarks from similar customers.

False Positive Rate (FPR)

Measures the percentage of legitimate traffic blocked, impacting user experience and business operations.

Mean Time to Detect (MTTD)

Indicates the time from attack start to alert generation, crucial for minimizing damage.

Virtual Patching Latency

Measures the time to deploy a rule for a new CVE, reflecting responsiveness to emerging threats.

Percentage of applications with WAAP coverage

Reveals the extent of protection across your web application portfolio.

Latency Impact (Processing Time)

Indicates the performance overhead introduced by the WAAP solution.