The access rule feature defines the scope of server processes that are connected to Application Protection in automatic access mode. It supports three policy configurations: blacklist, whitelist, and automatic full access. This topic describes the configuration logic, priority, and operational instructions for each rule. This feature is suitable for security O&M scenarios that require fine-grained control over the protection scope and a reduced impact from false positives.
Blacklist and whitelist rule details
How rules take effect
Blacklists and whitelists apply only to the automatic access mode and do not affect the manual access mode.
Blacklists have a higher priority than whitelists. If a process matches both a blacklist rule and a whitelist rule, the process is not connected.
Blacklists and whitelists take effect immediately if they are configured before a process is connected. If they are configured after a process is connected, the rules take effect after the process restarts or during the next automatic access. Deleting a blacklist rule takes effect immediately.
Scenarios
List type | Description | Scenario features | Applicable process types |
Blacklist |
|
|
|
Whitelist |
| Protect only critical processes to follow the principle of least privilege. |
|
Add a whitelist or blacklist
The following steps describe how to add a blacklist. The procedure for adding a whitelist is similar.
Log on to the Security Center console.
In the navigation pane on the left, choose . In the upper-left corner of the console, select the region where your asset is located: Chinese Mainland or Outside Chinese Mainland.
On the Application Configurations tab, click Management Settings in the upper-right corner.
On the Manage Access Rule tab of the Management Settings panel, click the Blacklist tab, and then click Add Blacklist.
In the Add Blacklist dialog box, configure the following parameters and click OK.
Parameter
Description
Rule Name
Enter a name for the access blacklist rule.
Rule Switch
Enabled by default. This means the blacklist rule is active.
Effective Application Type
Select the application language for which the blacklist is effective: Java or PHP.
Match Condition
Select the matching conditions for the blacklist rule. Options:
cmdline: Match processes to exclude based on command-line parameters. Supported matching methods include the following: contains, does not contain, contains one of multiple values, and does not contain any of the values.
Environment Variables : Match processes to exclude based on the environment variables they access. The supported matching method is equals.
-D parameter : Match processes to exclude based on system properties set at Java program startup. The supported matching method is equals.
NoteThis is configurable only when Effective Application Type is set to Java.
Container Name: Match processes to exclude based on the name of the container they belong to. Supported matching methods include the following: contains, does not contain, contains one of multiple values, and does not contain any of the values.
NoteThis is configurable only when Effective Application Type is set to PHP.
Click Add Condition to add multiple matching conditions. The logical relationship between multiple conditions is AND, which means all conditions must be met.
The following are configuration examples:
Exclude processes whose startup parameters contain the
tomcatcharacterSet Whitelist Mode to cmdline.
Set Match Mode to Include.
For Content to Match, enter tomcat.
Exclude processes whose startup parameters do not contain the
apacheandtestcharactersSet Whitelist Mode to cmdline.
Set Match Mode to Does Not Contain Any Value.
For Content to Match, enter apache,test.
Match Mode
Select the matching method for the rule.
Match Field
Enter the matching field for the rule.
NoteThis parameter is required only when Match Condition is set to Environment Variables or -D parameter .
Content to Match
Enter the matching content for the rule.
Destination Application Groups
Select the application groups for which the access blacklist rule is effective. The application type of the application groups must be the same as the one specified for Effective Application Type.
Edit or delete a whitelist or blacklist
Log on to the Security Center console.
In the navigation pane on the left, choose . In the upper-left corner of the console, select the region where your asset is located: Chinese Mainland or Outside Chinese Mainland.Outside China
On the Application Configurations tab, click Management Settings in the upper-right corner.
In the Management Settings panel, on the Manage Access Rule tab, on the Blacklist or Application Access Whitelist sub-tab, click Edit or Delete in the Actions column for the desired rule.
You can delete only rules that are not applied to an application group. Before you delete a rule, you must detach the associated application groups.
Automatic full access (Java processes only)
Supported scenarios
If you enable Application Protection on a pay-as-you-go basis and do not configure custom binding, the system connects all Java processes on your assets to Application Protection by default. The slow access method is used.
If you have enabled Application Protection but have not connected any processes, a dialog box appears that informs you Application Protection is not connected and provides the Automatic Full Access and Custom Access options. If you select Automatic Full Access, the slow access method is used by default. You can click Configure Now to adjust the access method and select Fast Access, Regular Access, or Slow Access.
Access method details
Access method | Description |
Fast Access | Suitable for scenarios with a small number of processes and low requirements for business stability. The installation time is short. |
Regular Access | Suitable for scenarios with a moderate number of processes and low requirements for business stability. The installation time is medium. |
Slow Access | Suitable for scenarios with many processes and high requirements for business stability. The installation time is long. |
How to stop full access
After you enable the Automatic Full Access mode, you can stop the accessing process by clicking Stop Accessing in the prompt on the tab.
After you stop the access, you cannot perform a full access again. Servers with a access status of Queuing will no longer be connected to Application Protection. Servers with a access status of In Progress will continue the installation.
After you stop the access, you can click View Details in the prompt message to view the access status of Java processes on your assets.