Wallarm is an integrated application and API security platform that combines web application firewall capabilities with specialized API protection.
The platform discovers APIs automatically, detects threats in real-time, and blocks attacks without requiring manual rule configuration or signature updates.
What is Wallarm?
Modern applications rely heavily on APIs, yet traditional WAFs struggle to protect them effectively.
Wallarm addresses this gap by treating API security as a first-class concern alongside web application protection.
The platform uses machine learning to understand normal API behavior and detect anomalies that indicate attacks.
Wallarm deploys as an inline node (similar to a WAF) or as an out-of-band monitor.
The inline mode actively blocks threats while the monitoring mode provides visibility without impacting traffic.
Both modes feed the same analytics dashboard for unified security visibility.
Key Features
Automatic API Discovery
Wallarm discovers APIs by analyzing traffic patterns.
The platform identifies endpoints, parameters, data types, and authentication methods without requiring API specifications.
Shadow APIs and undocumented endpoints become visible, helping teams understand their actual API attack surface.
AI-Powered Threat Detection
Machine learning models establish baselines of normal API behavior and flag deviations.
This approach catches zero-day attacks and business logic abuse that signature-based systems miss.
The AI adapts to your specific API patterns rather than relying on generic attack signatures.
API Abuse Prevention
Beyond traditional injection attacks, Wallarm detects API-specific threats:
- Credential stuffing and account takeover
- Scraping and data exfiltration
- Rate limit bypass attempts
- Business logic manipulation
- Inventory enumeration
OWASP API Security Coverage
Protection against the OWASP API Security Top 10:
- Broken Object Level Authorization (BOLA)
- Broken Authentication
- Excessive Data Exposure
- Lack of Resources & Rate Limiting
- Broken Function Level Authorization
- Mass Assignment
- Security Misconfiguration
- Injection attacks
- Improper Assets Management
- Insufficient Logging & Monitoring
GraphQL Security
Specialized protection for GraphQL APIs including:
- Query depth limiting
- Query complexity analysis
- Introspection blocking
- Batching attack prevention
- Field-level authorization enforcement
Bot Management
Distinguish between legitimate automation and malicious bots.
The system identifies bot signatures, behavioral patterns, and client fingerprints.
Policies can allow, challenge, or block different bot categories.
Installation
Wallarm deploys via several methods depending on your infrastructure.
Docker Deployment
docker run -d \
--name wallarm-node \
-e WALLARM_API_TOKEN="your-token" \
-e NGINX_BACKEND="http://your-backend:8080" \
-p 80:80 \
wallarm/node:latest
Kubernetes (Helm)
helm repo add wallarm https://charts.wallarm.com
helm repo update
helm install wallarm-ingress wallarm/wallarm-ingress \
--set controller.wallarm.enabled=true \
--set controller.wallarm.token="your-token"
NGINX Module
# Add Wallarm repository
curl -fsSL https://repo.wallarm.com/wallarm.gpg | sudo gpg --dearmor -o /usr/share/keyrings/wallarm.gpg
# Install module
sudo apt-get install wallarm-node-nginx
# Register node
sudo /usr/share/wallarm-common/register-node --token <your-token>
Cloud Connectors
Native integrations available for:
- AWS (ALB, API Gateway, CloudFront)
- Azure (Application Gateway, Front Door)
- Google Cloud (Cloud Armor, Load Balancer)
- Cloudflare Workers
How to Use Wallarm
Basic Configuration
Configure protection policies in the Wallarm Console:
# wallarm.yaml
mode: block # or monitoring
api_discovery: enabled
sensitivity: balanced
rules:
- name: "Block SQLi"
action: block
attacks: [sqli]
- name: "Rate limit login"
endpoint: "/api/v1/login"
rate_limit: 10/minute
action: block
API Discovery Settings
api_discovery:
enabled: true
sensitive_data_detection: true
baseline_period: 7d
endpoints:
include:
- "/api/*"
exclude:
- "/health"
- "/metrics"
Custom Detection Rules
custom_rules:
- name: "Protect admin endpoints"
match:
path: "/admin/*"
require:
header: "X-Admin-Token"
action: block
- name: "Prevent enumeration"
match:
path: "/api/users/{id}"
detect:
sequential_ids: true
threshold: 50/minute
action: challenge
GraphQL Configuration
graphql:
enabled: true
introspection: block # block in production
max_depth: 10
max_complexity: 1000
batching:
enabled: true
max_queries: 5
Integration
GitHub Actions (API Testing)
name: API Security Scan
on: [push]
jobs:
scan:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Start application
run: docker-compose up -d
- name: Run Wallarm Scanner
uses: wallarm/api-scanner-action@v1
with:
api-token: ${{ secrets.WALLARM_TOKEN }}
target-url: http://localhost:8080
openapi-spec: ./openapi.yaml
- name: Check results
run: |
if [ -f wallarm-results.json ]; then
cat wallarm-results.json
fi
Terraform Deployment
resource "wallarm_node" "api_gateway" {
name = "production-gateway"
settings {
mode = "block"
api_discovery {
enabled = true
}
rate_limiting {
enabled = true
threshold = 1000
period = "1m"
}
}
}
resource "wallarm_rule" "protect_payments" {
node_id = wallarm_node.api_gateway.id
match {
path = "/api/payments/*"
}
action = "block"
sensitivity = "high"
}
SIEM Integration
Forward security events to your SIEM:
integrations:
siem:
type: syslog
host: siem.example.com
port: 514
protocol: tcp
format: cef
splunk:
type: hec
url: https://splunk.example.com:8088
token: ${SPLUNK_TOKEN}
index: security
CI/CD Pipeline Integration
# GitLab CI
api-security:
stage: security
image: wallarm/api-scanner:latest
script:
- wallarm-scanner --target $CI_ENVIRONMENT_URL --spec openapi.yaml
artifacts:
reports:
dast: wallarm-report.json
only:
- main
When to Use Wallarm
Wallarm fits organizations that need to:
- Protect APIs alongside traditional web applications
- Discover and inventory shadow APIs automatically
- Detect API-specific attacks like BOLA and business logic abuse
- Secure GraphQL endpoints with query analysis
- Integrate runtime protection into cloud-native infrastructure
The platform works well for API-first companies, microservices architectures, and organizations modernizing legacy applications.
The automatic API discovery helps teams get visibility quickly without requiring complete API documentation.
For basic WAF needs without significant API traffic, simpler solutions may suffice.
Wallarm delivers value when API security is a priority and you need detection capabilities beyond signature-based approaches.