Skip to content

Wallarm Documentation: Comprehensive Technical Guide

Wallarm Documentation provides complete technical documentation for deploying, configuring, and managing the Wallarm API Security Platform. Documentation is available in 5 languages to support global enterprise deployments.

Available Languages

  • English: https://docs.wallarm.com (Primary language)
  • 日本語 (Japanese): Available via language selector
  • Türkçe (Turkish): Available via language selector
  • Português (Portuguese/BR): Available via language selector
  • العربية (Arabic): Available via language selector

Documentation Structure

Quick Start & Getting Started

Platform Architecture & Core Concepts

How Wallarm Works

  • Filtering Node: In-line or out-of-band traffic analysis and attack mitigation
  • Wallarm Cloud: Cloud-based analytics, API structure analysis, and management console
  • Deployment Forms: Security Edge, Hybrid, and On-Premises options

Core Modules

  • Cloud-Native WAAP: Web Application & API Protection with OWASP Top-10 coverage
  • API Protection: Advanced API security capabilities for modern threats
  • Glossary: Core Wallarm entities and terminology

Installation & Deployment

Deployment Options

Platform Integration

  • NGINX / NGINX Plus
  • Kubernetes Ingress Controller
  • Kong API Gateway
  • Envoy Proxy
  • AWS, GCP, Azure cloud environments
  • eBPF / Cloud Native deployments

Threat Management

Attacks & Incidents

Security Issues

API Discovery & Inventory

API Protection Capabilities

Specification Enforcement

API Abuse Prevention

Specialized Protection

API Attack Surface Management (AASM)

  • Setup & Configuration: Enable AASM for external asset discovery
  • Domain and subdomain enumeration
  • API discovery and risk assessment
  • Security misconfiguration identification
  • API leak detection in public repositories
  • Vulnerability scanning without agents

API Sessions Analysis

Rules & Mitigation Controls

Request Processing

Rule Lifecycle

  • Custom ruleset building and deployment
  • Filtering node synchronization (every 2-4 minutes)
  • Rule inheritance and branching
  • Default rules and endpoint-specific rules

Security Testing

Testing Methods

  • Passive Detection: Built-in traffic analysis without sending test requests
  • Threat Replay Testing (TRT): Transform real attacks into security tests
  • Schema-Based Testing (SBT): DAST solution using OpenAPI specifications
  • API Attack Surface Management (AASM): Agentless external vulnerability scanning

CI/CD Integration

  • Jenkins, GitLab, CircleCI integration
  • Automated security testing in development pipelines
  • Vulnerability detection before production

Integrations & Ecosystem

  • Integrations Overview: Connect with security and DevOps tools
  • Incident Response: PagerDuty, OpsGenie
  • Security: Splunk, Sumo Logic, Microsoft Sentinel
  • Code Repositories: GitHub, GitLab
  • Communication: Slack, Microsoft Teams
  • Observability: Prometheus, Datadog
  • Universal: Webhooks and Wallarm APIs

API Reference

  • Wallarm API Overview: Programmatic access to Wallarm platform
  • API endpoints for managing vulnerabilities, attacks, incidents, users, clients, and filtering nodes
  • Authentication methods and security
  • US Cloud API: https://us1.api.wallarm.com/
  • EU Cloud API: https://api.wallarm.com/

Dashboards & Reporting

  • Threat Prevention Dashboard: Real-time attack monitoring
  • API Discovery Dashboard: API inventory and risk overview
  • OWASP API 2023 Dashboard: Coverage mapping
  • Reports: Custom reporting and compliance documentation

User Guides & Administration

  • User management and access control
  • Application configuration
  • Traffic filtration modes (monitoring, safe blocking, blocking)
  • Activity logs and audit trails
  • Subscription plan management

Release Notes & Updates

  • Changelog & News: Latest features, improvements, and security updates
  • Version-specific documentation (6.x, 5.x, 4.10)
  • Backward compatibility information

Documentation Versions

Current Versions

  • Version 6.x and 0.14.x+: Latest stable release with full feature set
  • Versions 5.x and 0.13.x-: Previous stable release
  • Version 4.10: Legacy version (⚠ Warning: outdated)

Key Technical Concepts

Attack Detection Methods

  • Input Validation Attacks: SQLi, XSS, RCE, Path Traversal (detected via syntax analysis)
  • Behavioral Attacks: Brute force, BOLA, API abuse, credential stuffing (detected via correlation analysis)
  • Multi-protocol support: REST, SOAP, GraphQL, gRPC, WebSocket, JSON

Traffic Analysis

  • Deep packet inspection with multi-stage parsing
  • Context-aware request analysis
  • Session reconstruction and behavior profiling
  • Sensitive data detection (PII, credentials, financial data)

Deployment Flexibility

  • In-line: Real-time blocking with near-zero latency
  • Out-of-band: Mirror traffic analysis without affecting production
  • Hybrid: Mix deployment options across environments
  • eBPF support for kernel-level traffic inspection

Support Resources

Cloud Platforms

Getting Help

  • Support Portal: support.wallarm.com
  • General Contact: request@wallarm.com
  • Phone: +1 (415) 940-7077
  • Headquarters: 188 King St, Unit 508, San Francisco, CA 94107, USA
  • Documentation search functionality
  • Video tutorials and demos
  • Technical support channels
  • Community resources

Best Practices Documentation

  • Security configuration recommendations
  • Performance optimization guides
  • Scalability patterns
  • Compliance and regulatory guidance

Advanced Features

AI/ML Capabilities

  • Behavioral analysis and anomaly detection
  • Business logic abuse detection
  • Automated threat intelligence
  • Self-learning attack patterns

Enterprise Features

  • Multi-tenancy support
  • Role-based access control (RBAC)
  • Compliance reporting (GDPR, PCI DSS, SOC 2)
  • API for automation and integration

Security Operations

  • 24/7 SOC-as-a-Service option
  • Real-time alerting and notifications
  • Automated incident response workflows
  • Threat verification and validation

Wallarm Ecosystem

Cloud Consoles

Documentation Maintenance

Wallarm follows an API-first approach where new functionality is released in the public API and then documented. The documentation is continuously updated with:
- New feature releases
- Security updates and patches
- Best practices and use cases
- Integration guides
- Troubleshooting resources

llms.md created for Wallarm Technical Documentation