Mod_Security is an open-source web application firewall. It monitors the incoming web request to your web server in real-time. It protects your web application against various attacks such as session hijacking, SQL injection, cross-site scripting, etc. on web applications using the added rulesets. It supports by the web-browsers such as Apache, Nginx, and IIS.
Please refer to the following steps to install mod security on CentOS 7.x
- At first, run the below command to update the software repository.
sudo yum update -y
- Install mod security using the below command.
sudo yum install mod_security -y
- You can check the mod security version with the below command.
sudo yum info mod_security
After the installation, configure the mod security to detect and log suspicious activity.
- We will copy the default ModSecurity config file to a new file.
sudo cp /etc/modsecurity/modsecurity.conf-recommended /etc/modsecurity/modsecurity.conf
- Open the ModSecurity.conf file in your favorite editor.
- At the top of the file, locate SecRuleEngine DetectionOnly. Change the DetectionOnly to On.
- Save your changes to the ModSecurity.conf file.
- Restart the apache service on your server.
systemctl restart apache2
How to Download OWASP Core Rule Set
We can download the latest ModSecurity core ruleset (CRS) from the Open Web Application Security Project (OWASP) at CoreRuleSet.org to ensure that we have the latest ModSecurity rules.
- Run the below command to install Git.
sudo yum install git
- Download the CRS copy from git using the below command.
git clone https://github.com/SpiderLabs/owasp-modsecurity-crs.git
- Open it with the cd command.
- Move the CRS file to mod security and move the rules as well.
sudo mv crs-setup.conf.example /etc/modsecurity/crs-setup.conf
sudo mv rules/ /etc/modsecurity
- Open the security2.conf file and verify that it is set to load mod_security rules.
sudo nano /etc/apache2/mods-enabled/security2.conf
- Below two lines should remain uncommented.
- Restart the apache service with the below command.
sudo systemctl restart httpd.service