security professional security skill risk: medium
Runtime Application Self-Protection Deployment Guide
The prompt outlines prerequisites, four sequential steps for deploying OpenRASP agents, configuring OWASP Top 10 detection policies, baselining, and SIEM integration, plus an expec…
SKILL 4 files · 2 folders
SKILL.md
--- name: implementing-runtime-application-self-protection description: "Deploy Runtime Application Self-Protection (RASP) agents to detect and block attacks from within application" --- # Implementing Runtime Application Self-Protection ## Overview Runtime Application Self-Protection (RASP) instruments application code at runtime to detect and block attacks by examining actual execution context rather than relying solely on network traffic patterns. Unlike WAFs that inspect HTTP requests externally, RASP agents intercept dangerous operations (SQL queries, file operations, command execution, deserialization) at the function level inside the application, achieving near-zero false positives. This skill covers deploying OpenRASP for Java applications, configuring detection policies for OWASP Top 10 attacks, tuning alerting thresholds, and integrating RASP telemetry with SIEM platforms. ## When to Use - When deploying or configuring implementing runtime application self protection capabilities in your environment - When establishing security controls aligned to compliance requirements - When building or improving security architecture for this domain - When conducting security assessments that require this implementation ## Prerequisites - Java 8+ application server (Tomcat, Spring Boot, or JBoss) or Python Flask/Django application - OpenRASP agent package (rasp-java or equivalent) - OpenRASP management console for centralized policy management - SIEM integration endpoint (Splunk HEC, Elasticsearch, or syslog) - Application staging environment for RASP testing before production ## Steps ### Step 1: Deploy RASP Agent Install the RASP agent into the application server runtime using JVM agent attachment for Java or middleware hooks for Python. ### Step 2: Configure Detection Policies Define detection rules for SQL injection, command injection, SSRF, path traversal, XXE, and deserialization attacks with block or monitor actions. ### Step 3: Tune and Baseline Run the agent in monitor mode during normal operations to establish baseline behavior and tune policies to reduce false positives before switching to block mode. ### Step 4: Integrate with SIEM Forward RASP alerts to the SIEM for correlation with WAF, IDS, and authentication events to build comprehensive attack timelines. ## Expected Output JSON report containing RASP policy audit results, detected attack attempts with stack traces, blocked requests summary, and coverage assessment against OWASP Top 10.
REQUIRED CONTEXT
- Java 8+ or Python application server
- OpenRASP agent package
- OpenRASP management console
- SIEM integration endpoint
- Application staging environment
EXPECTED OUTPUT
- Format
- json
- Schema
- json_schema · RASP policy audit results, detected attack attempts with stack traces, blocked requests summary, coverage assessment against OWASP Top 10
- Constraints
- JSON report containing RASP policy audit results, detected attack attempts with stack traces, blocked requests summary, and coverage assessment against OWASP Top 10
CAVEATS
- Dependencies
- Java 8+ application server (Tomcat, Spring Boot, or JBoss) or Python Flask/Django application
- OpenRASP agent package (rasp-java or equivalent)
- OpenRASP management console for centralized policy management
- SIEM integration endpoint (Splunk HEC, Elasticsearch, or syslog)
- Application staging environment for RASP testing before production
- Missing context
- Exact commands or configuration file examples
- Output format details beyond high-level JSON description
QUALITY
- OVERALL
- 0.70
- CLARITY
- 0.85
- SPECIFICITY
- 0.55
- REUSABILITY
- 0.70
- COMPLETENESS
- 0.75
IMPROVEMENT SUGGESTIONS
- Add explicit placeholders for application-specific variables such as server type and SIEM endpoint.
- Expand Step 1-4 with concrete command examples or configuration snippets while keeping them templated.
USAGE
Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.