A strong password is your first line of defense.
password.length >= 13 AND hasUpperCase AND hasLowerCase AND hasNumber AND hasSpecialCharThis rule prevents database queries from running longer than 30 seconds.
Key settings:
| Parameter | Value |
|---|---|
| Max Execution Time | 30000ms |
| Action | Terminate Query |
if (query.executionTime > 30000) {
return TERMINATE;
}user@domain.com
^[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}$
Transactions exceeding these limits will be automatically blocked and flagged for review.
For limit increases, contact support@example.com
Personal data retention must comply with GDPR Article 5(1)(e).
"Personal data shall be kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed."
Maximum retention periods:
Reference: GDPR Regulation (EU) 2016/679
MFA is mandatory for privileged accounts.
Press Ctrl + Alt + M to open MFA settings.
Supported methods:
Formula: security_score = password_strength Ć mfa_enabled2
This rule detects and blocks potential SQL injection attempts.
Common injection patterns blocked:
SELECT * FROM users WHERE id = '1' OR '1'='1'
DROP TABLE users; --
UNION SELECT * FROM passwords
Protection includes:
Updated: Now includes NoSQL injection prevention
This rule has been deprecated in favor of the new adaptive rate limiting system.
Previous limits were:
| Tier | Requests/Hour | Burst Limit |
|---|---|---|
| Free | 100 | 10 |
| Pro | 1,000 | 50 |
| Enterprise | 10,000 | 500 |