1. Create a new query group called "White List" and configure it for the appropriate database and proxy.
2. Create a new IPS/IDS rule to block SQL injections and log intrusion events for the database.
3. Create a new database firewall rule that uses the "White List" query group and allows those queries to access the database.
2. Create a query-based white list:
4 simple steps
1. Create a new Query Group
2. Create a new IPS/IDS rule
3. Create a new Database
Firewall rule
4. Propagate the white list
Query Group