{"id":1376,"date":"2025-11-05T22:20:40","date_gmt":"2025-11-05T19:20:40","guid":{"rendered":"https:\/\/www.dchost.com\/blog\/waf-ve-bot-korumasi-cloudflare-modsecurity-ve-fail2bani-ayni-masada-baristirmanin-sicacik-hikayesi\/"},"modified":"2025-11-05T22:20:40","modified_gmt":"2025-11-05T19:20:40","slug":"waf-ve-bot-korumasi-cloudflare-modsecurity-ve-fail2bani-ayni-masada-baristirmanin-sicacik-hikayesi","status":"publish","type":"post","link":"https:\/\/www.dchost.com\/blog\/waf-ve-bot-korumasi-cloudflare-modsecurity-ve-fail2bani-ayni-masada-baristirmanin-sicacik-hikayesi\/","title":{"rendered":"WAF ve Bot Korumas\u0131: Cloudflare, ModSecurity ve Fail2ban\u2019\u0131 Ayn\u0131 Masada Bar\u0131\u015ft\u0131rman\u0131n S\u0131cac\u0131k Hik\u00e2yesi"},"content":{"rendered":"<div class=\"dchost-blog-content-wrapper\"><h2 id='section-1'>Ofiste Bir G\u00fcnd\u00fc: Botlar Kap\u0131y\u0131 \u00c7al\u0131nca Ne Yapars\u0131n?<\/h2>\n<p>Hi\u00e7 gece yar\u0131s\u0131 sitede gariplikler oldu mu? Trafik dalga dalga y\u00fckselir, Analytics\u2019te \u00fclkeler de\u011fi\u015fir, sepete atmalar artar ama kasa sessizdir. O ak\u015fam ofiste kahvemi bitirirken, monit\u00f6rde dans eden istekleri izledim ve bir an d\u00fc\u015f\u00fcnd\u00fcm: Bu ak\u0131\u015f\u0131 kenarda s\u00fczen, i\u00e7eride inceleyen ve en sonda kap\u0131y\u0131 kilitleyen bir d\u00fczen kurmadan rahat yok. O an ba\u015flad\u0131 bu yaz\u0131n\u0131n tohumu.<\/p>\n<p>Bu sat\u0131rlarda <strong>WAF ve bot korumas\u0131n\u0131<\/strong> sadece ad\u0131yla de\u011fil, dokunup hissetti\u011fin bir d\u00fczen gibi anlatmak istiyorum. Kenarda Cloudflare, sunucu taraf\u0131nda ModSecurity ve sistem seviyesinde Fail2ban. \u00dc\u00e7\u00fc bir araya gelince ortaya, sa\u00e7aklar\u0131 r\u00fczg\u00e2rda savrulmayan, \u00e7at\u0131s\u0131 sa\u011flam bir ev \u00e7\u0131k\u0131yor. Mesela \u015f\u00f6yle d\u00fc\u015f\u00fcn: Sokak giri\u015finde bir g\u00fcvenlik g\u00f6revlisi, kap\u0131da bir ikinci kontrol, i\u00e7eride ise devriye gezen biri. \u0130\u015fte o gece \u00f6\u011frendi\u011fim, ayarlar\u0131n ve kurallar\u0131n \u00f6tesinde bir \u015feydi: Katmanlar\u0131 konu\u015fturmak.<\/p>\n<p>Yaz\u0131n\u0131n devam\u0131nda \u00f6nce neyi neden yapt\u0131\u011f\u0131m\u0131z\u0131 konu\u015faca\u011f\u0131z, sonra Cloudflare\u2019\u0131n kenarda yapt\u0131\u011f\u0131 s\u00fczge\u00e7 i\u015fini, ModSecurity\u2019nin i\u00e7erideki g\u00f6z\u00fcn\u00fc ve Fail2ban\u2019in pratik bile\u011fini tek tek ele alaca\u011f\u0131z. En sonunda da \u00fc\u00e7\u00fcn\u00fc birle\u015ftiren s\u0131cak bir yol haritas\u0131 \u00e7\u0131karaca\u011f\u0131z. Kuru tarifler yerine, sahadan k\u00fc\u00e7\u00fck hik\u00e2yelerle.<\/p>\n<h2 id='section-2'>WAF ve Bot Korumas\u0131 Ne \u0130\u015fe Yarar, Ne Zaman Yeterli Gelmez?<\/h2>\n<p>WAF\u2019i bir kilit gibi de\u011fil de, kap\u0131n\u0131n \u00f6n\u00fcndeki ak\u0131ll\u0131 paspas gibi d\u00fc\u015f\u00fcn. \u00dczerinde iz kal\u0131r, gelenin ayak izini g\u00f6r\u00fcr, nereye bast\u0131\u011f\u0131n\u0131 sezersin. <strong>WAF<\/strong>, tehlikeli desenleri, tuhaf sorgu parametrelerini, kaba kuvvet denemelerini fark eder ve daha uygulamaya ula\u015fmadan durdurur. Bot korumas\u0131 da ayn\u0131 havadan, ama ritme bakar. \u00c7ok h\u0131zl\u0131, \u00e7ok \u0131srarl\u0131, \u00e7ok anlams\u0131z bir hareket g\u00f6rd\u00fc\u011f\u00fcnde, \u201cBir sakin ol\u201d der ve kap\u0131da k\u00fc\u00e7\u00fck bir soruya y\u00f6nlendirir.<\/p>\n<p>Yine de her kilidin bir anahtar\u0131 bulunur. Bu y\u00fczden tek bir araca yaslanmak bazen hayal k\u0131r\u0131kl\u0131\u011f\u0131 yarat\u0131r. Kenarda WAF k\u00f6t\u00fc niyetli ak\u0131\u015f\u0131 yakalarken, i\u00e7eride beklenmedik bir uygulama hatas\u0131 yeni bir kap\u0131 aralayabilir. Bazen iyi niyetli bir entegrasyon, garip bir payload ile WAF\u2019i k\u0131zd\u0131r\u0131r. Bu noktalarda sorunun \u00e7\u00f6z\u00fcm\u00fc, tek arac\u0131 g\u00fc\u00e7lendirmek yerine, <strong>katmanl\u0131 bir d\u00fczen<\/strong> kurmak oluyor. Kenarda filtre, orta katta inceleme, en altta ise h\u0131zla kapatma ve kara listeye alma.<\/p>\n<p>Bir de \u015fu var: Bot korumas\u0131 sadece sald\u0131rganlar\u0131 de\u011fil, sab\u0131rs\u0131z taray\u0131c\u0131lar\u0131, yanl\u0131\u015f yap\u0131land\u0131r\u0131lm\u0131\u015f izleme ara\u00e7lar\u0131n\u0131, hatta iyi niyetli ama a\u011f\u0131r \u00e7al\u0131\u015fan entegrasyonlar\u0131 da terletebilir. O y\u00fczden kurarken \u201cherkese \u015f\u00fcphe\u201d yerine, \u201ckritik yollar\u0131 koru, geri kalanlar\u0131 nazik\u00e7e izle\u201d yakla\u015f\u0131m\u0131 i\u015f g\u00f6r\u00fcyor. Login, arama ve \u00f6deme gibi dar bo\u011fazlar\u0131 \u00f6nceliklendirmek, g\u00fcr\u00fclt\u00fcy\u00fc azalt\u0131yor.<\/p>\n<h2 id='section-3'>Cloudflare Kenarda: S\u00fczgeci \u0130nce Ayarla, Ritmi Dinle<\/h2>\n<p>Cloudflare\u2019\u0131 sevdi\u011fim taraf\u0131 \u015fu: Kenarda, uygulamaya daha dokunmadan, ak\u0131\u015f\u0131 yumu\u015fat\u0131r. <strong>WAF kurallar\u0131<\/strong> ile bilinen riskleri otomatik frenleyebilir, \u00f6zel yazd\u0131\u011f\u0131n kurallarla da sitenin ritmine g\u00f6re filtreyi s\u0131k\u0131p gev\u015fetebilirsin. Mesela arama u\u00e7 noktas\u0131na pe\u015f pe\u015fe istek atan adreslere ufak bir mola verdirirsin; admin giri\u015fine tan\u0131d\u0131k olmayan bir \u00fclkeden gelen kullan\u0131c\u0131ya k\u00fc\u00e7\u00fck bir do\u011frulama \u00e7\u0131kar\u0131rs\u0131n. B\u00f6ylece hem performans korunur hem de gereksiz y\u00fck uygulamaya inmez.<\/p>\n<p>Kendi prati\u011fimde, \u00f6nceli\u011fi giri\u015f ve sepet s\u00fcre\u00e7lerine veriyorum. Admin taraf\u0131n\u0131 sadece belirli bir IP aral\u0131\u011f\u0131na a\u00e7mak, m\u00fcmk\u00fcnse ekstra bir do\u011frulama eklemek i\u015fe yar\u0131yor. Bir de <strong>oran s\u0131n\u0131rlama<\/strong> kural\u0131, \u00f6zellikle arama ve API u\u00e7lar\u0131nda mucize gibi. H\u0131zl\u0131 t\u0131klayan iyi niyetli kullan\u0131c\u0131y\u0131 bo\u011fmadan, \u201cfazla \u0131srarl\u0131\u201d olanlar\u0131 nazik\u00e7e yava\u015flat\u0131yor. Bu konuyu bir ad\u0131m daha derin g\u00f6rmek istersen, <a href='https:\/\/www.dchost.com\/blog\/cloudflare-waf-kurallari-ve-oran-sinirlama-ile-wordpressi-botlardan-nasil-korursun\/'>Cloudflare WAF kurallar\u0131 ve oran s\u0131n\u0131rlama ile WordPress\u2019i botlardan korumaya dair bu rehberdeki pratik ayarlar<\/a> g\u00fczel bir ilham veriyor.<\/p>\n<p>Cloudflare\u2019\u0131n bir ba\u015fka tatl\u0131 yan\u0131, <strong>challenge<\/strong> ak\u0131\u015f\u0131. Tam engellemek yerine, bir ufak do\u011frulama ile niyeti yoklars\u0131n. K\u00f6t\u00fc niyetli otomasyon \u015fu anlarda aya\u011f\u0131na dolan\u0131r, ger\u00e7ek kullan\u0131c\u0131 ise saniyeler i\u00e7inde yoluna devam eder. \u00d6zellikle belli saatlerde artan spam form g\u00f6nderimlerinde bu yakla\u015f\u0131m i\u015fleri \u00e7ok rahatlat\u0131yor. Bir yandan da loglar\u0131 izleyip hangi kurallar\u0131n en \u00e7ok \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 g\u00f6r\u00fcnce, gereksiz kat\u0131l\u0131\u011f\u0131 yumu\u015fatma veya a\u00e7\u0131k kalan bo\u015flu\u011fu kapatma \u015fans\u0131n oluyor.<\/p>\n<p>Daha detaya girmek istersen, <a href=\"https:\/\/developers.cloudflare.com\/waf\/\" rel=\"nofollow noopener\" target=\"_blank\">Cloudflare WAF belgeleri<\/a> sade anlat\u0131m\u0131yla fena de\u011fil. Y\u00f6ntem hep ayn\u0131: \u00d6nce g\u00f6r\u00fcn, sonra karar verin, en sonda engelleyin. Kenarda ger\u00e7ek zamanl\u0131 bir not defteri gibi tutulan veriler, i\u00e7eride yapaca\u011f\u0131n ince ayara \u0131\u015f\u0131k tutuyor.<\/p>\n<h2 id='section-4'>ModSecurity \u0130\u00e7eride: \u0130nce G\u00f6z, \u0130yi Niyetli \u0130stisnalar\u0131 Anlamak<\/h2>\n<p>Sunucu taraf\u0131nda <strong>ModSecurity<\/strong> devreye girince, i\u015f biraz mikroskopa d\u00f6n\u00fc\u015f\u00fcyor. Kenar\u0131n ka\u00e7\u0131rd\u0131\u011f\u0131 ya da uygulamaya \u00f6zg\u00fc desenler burada daha net se\u00e7iliyor. \u00d6zellikle <strong>OWASP Core Rule Set<\/strong> etkinle\u015fti\u011finde, s\u0131radan enjeksiyon denemeleri, \u015f\u00fcpheli parametre kombinasyonlar\u0131 ve garip i\u00e7erik tipleri daha i\u00e7eride fark ediliyor. Avantaj\u0131 b\u00fcy\u00fck, ama her mikroskop gibi hassas; yanl\u0131\u015f alarm\u0131 azaltmak i\u00e7in k\u00fc\u00e7\u00fck dokunu\u015flar \u015fart.<\/p>\n<p>Benim izledi\u011fim rota \u015f\u00f6yle: \u00d6nce kurallar\u0131 izleme modunda a\u00e7ar\u0131m. G\u00fcnl\u00fcklerde en \u00e7ok \u00f6ten, ama kullan\u0131c\u0131 deneyimini bozdu\u011fu anla\u015f\u0131lan kural\u0131 nazik\u00e7e t\u00f6rp\u00fclerim. Mesela bir \u00f6deme servisinin geri d\u00f6n\u00fc\u015f URL\u2019si baz\u0131 parametrelerde hassassa, o u\u00e7 nokta i\u00e7in esneklik tan\u0131r\u0131m. Bazen sadece belirli bir <strong>kural kimli\u011fi<\/strong> devre d\u0131\u015f\u0131 b\u0131rak\u0131l\u0131r, bazen de ilgili yol i\u00e7in istisna tan\u0131mlan\u0131r. Ne kadar nokta at\u0131\u015f\u0131, o kadar huzur.<\/p>\n<p>\u0130pu\u00e7lar\u0131n\u0131 bir arada g\u00f6rmek istersen, <a href=\"https:\/\/coreruleset.org\/\" rel=\"nofollow noopener\" target=\"_blank\">OWASP ModSecurity Core Rule Set dok\u00fcmantasyonu<\/a> pratik a\u00e7\u0131klamalar bar\u0131nd\u0131r\u0131yor. Oradaki fikirleri birebir kopyalamak yerine, sitenin ak\u0131\u015f\u0131na g\u00f6re uyarlamak en sa\u011fl\u0131kl\u0131s\u0131. Unutma, ama\u00e7 herkesi durdurmak de\u011fil; <strong>ger\u00e7ek kullan\u0131c\u0131y\u0131 incitmeden<\/strong> k\u00f6t\u00fc niyeti ay\u0131klamak.<\/p>\n<h2 id='section-5'>Fail2ban: H\u0131zl\u0131 Refleks, Sessiz G\u00fc\u00e7<\/h2>\n<p><strong>Fail2ban<\/strong> sahneye girdi\u011finde, sistem d\u00fczeyinde pratik bir refleks kazan\u0131yorsun. Loglar\u0131 dinler, \u015f\u00fcpheli tekrarlar\u0131 se\u00e7er, belirledi\u011fin e\u015fi\u011fi a\u015fanlar\u0131 ge\u00e7ici olarak d\u0131\u015far\u0131 al\u0131r. SSH\u2019a art arda yanl\u0131\u015f giri\u015f yapan, Nginx\u2019te arka arkaya 40x hatas\u0131 \u00fcreten ya da panel giri\u015fini taciz eden adresler, k\u0131sa s\u00fcre kap\u0131da bekletilir. Bu, buzlu bir i\u00e7ecek gibi; a\u015f\u0131r\u0131 \u0131s\u0131nm\u0131\u015f sunucu nefes al\u0131r.<\/p>\n<p>Fail2ban\u2019in g\u00fczelli\u011fi, <strong>g\u00fcnl\u00fc\u011fe g\u00f6re aksiyon<\/strong> almas\u0131. Yani torbaya her \u015feyi atmaz, senin yazd\u0131\u011f\u0131n kurallara bakar. Bir site i\u00e7in 10 dakikada 5 ba\u015far\u0131s\u0131z giri\u015f yeterli e\u015fik olabilir, ba\u015fka bir sitede 20 dakikada 10\u2019u beklemek daha do\u011frudur. Elbette beyaz listeye ekip IP\u2019lerini almak, yedek ba\u011flant\u0131lar\u0131 korumak ve mobil kullan\u0131c\u0131lar\u0131n de\u011fi\u015fken IP\u2019sine tolerans tan\u0131mak gerekir. \u0130ncelik burada.<\/p>\n<p>Daha fazla kurcalamak istersen, <a href=\"https:\/\/www.fail2ban.org\/wiki\/index.php\/Main_Page\" rel=\"nofollow noopener\" target=\"_blank\">Fail2ban resmi dok\u00fcmantasyonu<\/a> sade \u00f6rnekler sunuyor. Sevdi\u011fim bir numara da \u015fu: Fail2ban\u2019i sadece engellemekle b\u0131rakmay\u0131p, baz\u0131 durumlarda Cloudflare API\u2019sini \u00e7a\u011f\u0131rarak kenarda da listeye eklemek. B\u00f6ylece sald\u0131rgan hem kap\u0131dan hem sokak ba\u015f\u0131ndan uzakla\u015ft\u0131r\u0131lm\u0131\u015f oluyor. Ne kadar erken, o kadar hafif y\u00fck.<\/p>\n<h2 id='section-6'>\u00dc\u00e7l\u00fc Entegrasyon: Katmanlar Konu\u015funca G\u00fcr\u00fclt\u00fc Azal\u0131yor<\/h2>\n<p>Gelelim kilit noktaya: <strong>Cloudflare + ModSecurity + Fail2ban<\/strong> \u00fc\u00e7l\u00fcs\u00fc birlikte nas\u0131l ritim tutar? Ben bunu bir orkestraya benzetiyorum. Birinci enstr\u00fcman kenarda tempo tutar, ikincisi melodiyi berrakla\u015ft\u0131r\u0131r, \u00fc\u00e7\u00fcnc\u00fcs\u00fc uyumsuz notalar\u0131 nazik\u00e7e susturur. S\u0131rlar, bu enstr\u00fcmanlara do\u011fru s\u0131ray\u0131 ve alan\u0131 vermekte.<\/p>\n<p>\u00d6nce kenarda genel ak\u0131\u015f\u0131 yumu\u015fatmak en temiz ba\u015flang\u0131\u00e7. Sald\u0131rgan desenleri, abart\u0131l\u0131 h\u0131zlar\u0131 ve bilinen \u015f\u00fcpheli imzalar\u0131 burada tutup filtreledi\u011finde, sunucuya ula\u015fan trafik zaten daha kaliteli olur. Ard\u0131ndan ModSecurity ile uygulamaya \u00f6zel hassasiyetleri devreye al\u0131rs\u0131n. Webhook\u2019lar, \u00f6deme d\u00f6n\u00fc\u015fleri, \u00f6zel API u\u00e7lar\u0131\u2026 Hepsi i\u00e7in ince ayar. En sonda Fail2ban, tekrarlayan ve \u0131srarl\u0131 davran\u0131\u015flar\u0131 loglardan yakalay\u0131p ge\u00e7ici olarak d\u0131\u015far\u0131 al\u0131r; kimi durumlarda kenardaki kara listeye de haber verir.<\/p>\n<p>Bir kez bu d\u00f6ng\u00fcy\u00fc kurunca, t\u0131kanma anlar\u0131nda elin h\u0131zlan\u0131yor. Mesela ola\u011fan\u00fcst\u00fc bir dalga g\u00f6rd\u00fcn; \u00f6nce Cloudflare taraf\u0131nda anl\u0131k bir <strong>challenge<\/strong> y\u00fckseltmesi ve oran s\u0131n\u0131r\u0131, e\u015f zamanl\u0131 ModSecurity\u2019de ilgili u\u00e7 i\u00e7in ge\u00e7ici bir esneklik veya tersine s\u0131k\u0131la\u015ft\u0131rma, Fail2ban\u2019de e\u015fiklerin bir t\u0131k a\u015fa\u011f\u0131 \u00e7ekilmesi. Sonra sakinlik d\u00f6n\u00fcnce hepsini eski ayarlar\u0131na al\u0131rs\u0131n. Bu kadar.<\/p>\n<h2 id='section-7'>Ger\u00e7ek Bir Senaryo: Bot F\u0131rt\u0131nas\u0131, K\u00fc\u00e7\u00fck Dokunu\u015flar ve S\u00fck\u00fbnet<\/h2>\n<p>Bir ak\u015fam, bir WooCommerce ma\u011fazas\u0131nda sular y\u00fckseldi. Arama u\u00e7lar\u0131 yo\u011fun, \u00fcr\u00fcn sayfalar\u0131 s\u00fcrekli yenileniyor, sepetler \u015fi\u015fiyor ama \u00f6deme gelmiyor. \u0130lk hareketim kenarda oldu: Arama ve \u00fcr\u00fcn detay isteklerine d\u00fc\u015f\u00fck yo\u011funlukta bir <strong>rate limit<\/strong> ekledim, \u015f\u00fcpheli \u00fclkeler i\u00e7in yumu\u015fak bir do\u011frulama a\u00e7t\u0131m. Ak\u0131\u015f toparland\u0131; en az\u0131ndan dalga biraz yumu\u015fad\u0131.<\/p>\n<p>\u0130kinci ad\u0131mda ModSecurity loglar\u0131na bakt\u0131m. Baz\u0131 isteklerde tuhaf parametre kombinasyonlar\u0131 vard\u0131, ama iyi niyetli kullan\u0131c\u0131lar\u0131n da nadiren benzer yol izledi\u011fini g\u00f6rd\u00fcm. \u0130lgili kural\u0131 tamamen kapatmak yerine sadece o u\u00e7 noktada esnettim. B\u00f6ylece sahte isteklerin y\u00fczde \u00e7o\u011funu ay\u0131klarken, ger\u00e7ek kullan\u0131c\u0131n\u0131n nadir davran\u0131\u015f\u0131n\u0131 cezaland\u0131rmam\u0131\u015f oldum. \u0130nce i\u015f, ama kar\u015f\u0131l\u0131\u011f\u0131 b\u00fcy\u00fck.<\/p>\n<p>\u00dc\u00e7\u00fcnc\u00fc hamlede Fail2ban\u2019i devreye ald\u0131m. K\u0131sa s\u00fcre i\u00e7inde ayn\u0131 IP\u2019den \u00e7ok say\u0131da 404 ve 403 \u00fcreten adresleri 15 dakikal\u0131k beklemeye ald\u0131k. Biri geri d\u00f6ner ve denemeye devam ederse s\u00fcre uzuyor. Bu kombinasyon, y\u00fck\u00fc normal seviyesine indirdi. Hatta bu s\u00fcre\u00e7te konsolda spike\u2019lara bakarken akl\u0131ma geldi; benzer anlar\u0131 <a href=\"https:\/\/www.dchost.com\/blog\/o-gece-cpuya-ne-oldu-giris\/\">o gece CPU\u2019ya ne oldu\u011funu sorgulad\u0131\u011f\u0131m k\u00fc\u00e7\u00fck hik\u00e2yede<\/a> de ya\u015fam\u0131\u015ft\u0131m. Yazboz gibi de\u011fil, \u015fefkatli ayarla sorun \u00e7\u00f6z\u00fcl\u00fcyor.<\/p>\n<h2 id='section-8'>Bak\u0131m, G\u00f6zlem ve K\u00fc\u00e7\u00fck \u0130pu\u00e7lar\u0131<\/h2>\n<p>WAF ve bot ayarlar\u0131 kuruldu diye defteri kapatm\u0131yoruz. K\u00fc\u00e7\u00fck d\u00fczenli kontrollerle b\u00fcy\u00fck f\u0131rt\u0131nalar\u0131 ba\u015flamadan k\u0131sars\u0131n. Ayda bir kurallara bak\u0131p en \u00e7ok tetiklenenleri g\u00f6zden ge\u00e7irmek, istisnalar\u0131 taze tutmak ve loglar\u0131n ger\u00e7ekten anlaml\u0131 \u015feyler yazd\u0131\u011f\u0131ndan emin olmak yetiyor. Bir de \u201cstaging\u201d ortam\u0131nda de\u011fi\u015fiklikleri denemek, canl\u0131y\u0131 korkutmadan \u00f6\u011frenme l\u00fcks\u00fc sunuyor.<\/p>\n<p>Bu yolculukta <strong>yedeklerin<\/strong> de\u011feri b\u00fcy\u00fck. G\u00fcvenlik, her zaman tek ba\u015f\u0131na yeterli de\u011fil; hata pay\u0131 hep var. O y\u00fczden sa\u011flam bir kopya plan\u0131 kurmak i\u00e7e su serpiyor. \u0130stersen burada <a href=\"https:\/\/www.dchost.com\/blog\/3-2-1-yedekleme-stratejisi-neden-ise-yariyor-cpanel-plesk-ve-vpste-otomatik-yedekleri-nasil-kurarsin\/\">3-2-1 yedekleme stratejisinin neden i\u015fe yarad\u0131\u011f\u0131n\u0131 ve otomatik yedekleri nas\u0131l kuraca\u011f\u0131n\u0131<\/a> ad\u0131m ad\u0131m anlatan rehbere g\u00f6z at. Ayr\u0131ca altyap\u0131 taraf\u0131nda s\u00fcreklilik konu\u015facaksak, <a href=\"https:\/\/www.dchost.com\/blog\/hic-kesilmeden-yayinda-kalmak-mumkun-mu-anycast-dns-ve-otomatik-failover-ile-nasil-saglanir\/\">Anycast DNS ve otomatik failover ile yay\u0131nda kalmay\u0131<\/a> anlatt\u0131\u011f\u0131m yaz\u0131 da katmanl\u0131 g\u00fcvenlik vizyonuna g\u00fczel oturuyor.<\/p>\n<h2 id='section-9'>Kapan\u0131\u015fa Do\u011fru: Sakin, Katmanl\u0131, Anla\u015f\u0131l\u0131r<\/h2>\n<p>\u015eunu fark ettim: WAF ve bot korumas\u0131, d\u00fc\u011fmeleri sonuna kadar \u00e7evirmek de\u011fil. <strong>Sakin bir ritim<\/strong> tutturmak, ger\u00e7ek kullan\u0131c\u0131y\u0131 \u00fczmeden g\u00fcr\u00fclt\u00fcy\u00fc azaltmak. Cloudflare kenarda nefes ald\u0131r\u0131r, ModSecurity i\u00e7eride ger\u00e7e\u011fi ay\u0131klar, Fail2ban k\u00f6t\u00fc niyetli \u0131srar\u0131 kap\u0131n\u0131n \u00f6n\u00fcnde bekletir. \u00dc\u00e7\u00fc birlikteyken, sald\u0131r\u0131lar\u0131n \u00e7o\u011fu daha uygulamaya ula\u015fmadan yumu\u015far.<\/p>\n<p>E\u011fer bu yolculu\u011fa ba\u015flayacaksan, \u00f6nce kritik yollar\u0131 se\u00e7: login, arama, \u00f6deme, API. Kenarda yumu\u015fak do\u011frulama ve oran s\u0131n\u0131r\u0131, i\u00e7eride kural ayar\u0131, en altta loga g\u00f6re refleks. Bu d\u00fczeni bir kez kurunca gerisi bak\u0131m ve k\u00fc\u00e7\u00fck dokunu\u015flar. \u0130htiya\u00e7 duyarsan, ufak bir perspektif i\u00e7in <a href=\"https:\/\/www.dchost.com\/blog\/siber-guvenlik-tehditleri-neden-artiyor-bir-e-postayla-baslayan-soguk-dus-ve-sonrasi\/\">siber g\u00fcvenlik tehditlerinin neden artt\u0131\u011f\u0131na dair bu samimi notlar\u0131<\/a> da bir ara oku; kafadaki bulutlar\u0131 da\u011f\u0131t\u0131yor. Ve merak edenler i\u00e7in, Cloudflare taraf\u0131nda teknik ayr\u0131nt\u0131lara dalmak \u00fczere k\u0131sa bir referans daha b\u0131rakay\u0131m: <a href=\"https:\/\/developers.cloudflare.com\/waf\/\" rel=\"nofollow noopener\" target=\"_blank\">Cloudflare WAF belgeleri<\/a> pratik \u00f6rneklerle destekli.<\/p>\n<p>Umar\u0131m bu yaz\u0131, kafandaki d\u00fc\u011f\u00fcmleri biraz gev\u015fetmi\u015ftir. Ayarlarla bo\u011fu\u015furken \u201cbunu nas\u0131l insan gibi anlat\u0131r\u0131m\u201d diye dertleniyorum; umar\u0131m do\u011fru yeri bulmu\u015ftur. Sormak, dan\u0131\u015fmak ya da \u201c\u015furada tak\u0131ld\u0131m\u201d demek istersen, kap\u0131 a\u00e7\u0131k. Bir dahaki yaz\u0131da g\u00f6r\u00fc\u015fmek \u00fczere, g\u00fcvenli ve sakin ak\u0131\u015flar dilerim.<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Ofiste Bir G\u00fcnd\u00fc: Botlar Kap\u0131y\u0131 \u00c7al\u0131nca Ne Yapars\u0131n? Hi\u00e7 gece yar\u0131s\u0131 sitede gariplikler oldu mu? Trafik dalga dalga y\u00fckselir, Analytics\u2019te \u00fclkeler de\u011fi\u015fir, sepete atmalar artar ama kasa sessizdir. O ak\u015fam ofiste kahvemi bitirirken, monit\u00f6rde dans eden istekleri izledim ve bir an d\u00fc\u015f\u00fcnd\u00fcm: Bu ak\u0131\u015f\u0131 kenarda s\u00fczen, i\u00e7eride inceleyen ve en sonda kap\u0131y\u0131 kilitleyen bir d\u00fczen [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1377,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-1376","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-teknoloji"],"_links":{"self":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts\/1376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/comments?post=1376"}],"version-history":[{"count":0,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts\/1376\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/media\/1377"}],"wp:attachment":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/media?parent=1376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/categories?post=1376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/tags?post=1376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}