AWS WAF FAQs

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

flashcard set

Earn XP

Description and Tags

AWS Services

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

What is AWS WAF?

AWS WAF is a web application firewall that helps protect web applications from attacks by allowing you to configure rules that allow, block, or monitor (count) web requests based on conditions that you define. These conditions include IP addresses, HTTP headers, HTTP body, URI strings, SQL injection and cross-site scripting.

2
New cards

How does AWS WAF block or allow traffic?

As the underlying service receives requests for your web sites, it forwards those requests to AWS WAF for inspection against your rules. Once a request meets a condition defined in your rules, AWS WAF instructs the underlying service to either block or allow the request based on the action you define.

3
New cards

How does AWS WAF protect my web site or application?

AWS WAF is tightly integrated with Amazon CloudFront, the Application Load Balancer (ALB), Amazon API Gateway, and AWS AppSync – services that AWS customers commonly use to deliver content for their websites and applications. When you use AWS WAF on Amazon CloudFront, your rules run in all AWS Edge Locations, located around the world close to your end users. This means security doesn’t come at the expense of performance. Blocked requests are stopped before they reach your web servers. When you use AWS WAF on regional services, such as Application Load Balancer, Amazon API Gateway, and AWS AppSync, your rules run in region and can be used to protect internet-facing resources as well as internal resources.

4
New cards

Can I use AWS WAF to protect web sites not hosted in AWS?

Yes, AWS WAF is integrated with Amazon CloudFront, which supports custom origins outside of AWS.

5
New cards

Which types of attacks can AWS WAF help me to stop?

AWS WAF helps protects your website from common attack techniques like SQL injection and Cross-Site Scripting (XSS). In addition, you can create rules that can block or rate-limit traffic from specific user-agents, from specific IP addresses, or that contain particular request headers. See the AWS WAF Developer Guide for examples.

6
New cards

Which bot mitigation capabilities are available with AWS WAF?

AWS WAF Bot Control gives you visibility and control over common and pervasive bot traffic to your applications. With Bot Control, you can easily monitor, block, or rate-limit pervasive bots, such as scrapers, scanners, and crawlers, and you can allow common bots, such as status monitors and search engines. You can use the Bot Control managed rule group alongside other Managed Rules for WAF or with your own custom WAF rules to protect your applications. See the AWS WAF Bot Control section in the developer guide.

7
New cards

Can I get a history of all AWS WAF API calls made on my account for security, operational or compliance auditing?

Yes. To receive a history of all AWS WAF API calls made on your account, you simply turn on AWS CloudTrail in the CloudTrail's AWS Management Console. For more information, visit AWS CloudTrail home page or visit the AWS WAF Developer Guide.

8
New cards

Does AWS WAF support IPv6?

Yes, support for IPv6 allows the AWS WAF to inspect HTTP/S requests coming from both IPv6 and IPv4 addresses.

9
New cards

Does IPSet match condition for an AWS WAF Rule support IPv6?

Yes, you can setup new IPv6 match condition(s) for new and existing WebACLs, as per the documentation.

10
New cards

Can I expect to see IPv6 address appear in the AWS WAF sampled requests where applicable?

Yes. The sampled requests will show the IPv6 address where applicable.

11
New cards

Can I use IPv6 with all AWS WAF features?

Yes. You will be able to use all the existing features for traffic both over IPv6 and IPv4 without any discernable changes to performance, scalability or availability of the service.

12
New cards

What services does AWS WAF support?

AWS WAF can be deployed on Amazon CloudFront, the Application Load Balancer (ALB), Amazon API Gateway, and AWS AppSync. As part of Amazon CloudFront it can be part of your Content Distribution Network (CDN) protecting your resources and content at the Edge locations. As part of the Application Load Balancer it can protect your origin web servers running behind the ALBs. As part of Amazon API Gateway, it can help secure and protect your REST APIs. As part of AWS AppSync, it can help secure and protect your GraphQL APIs.

13
New cards

In what AWS Regions is AWS WAF available in?

Please refer to the AWS Region Services table.

14
New cards

Is AWS WAF HIPAA eligible?

Yes, AWS has expanded its HIPAA compliance program to include AWS WAF as a HIPAA eligible service. If you have an executed Business Associate Agreement (BAA) with AWS, you can use AWS WAF to protect your web applications from common web exploits. For more information, see HIPAA Compliance.

15
New cards

How does AWS WAF pricing work? Are there any upfront costs?

AWS WAF charges based on the number of web access control lists (web ACLs) that you create, the number of rules that you add per web ACL, and the number of web requests that you receive. There are no upfront commitments. AWS WAF charges are in addition to Amazon CloudFront pricing, the Application Load Balancer (ALB) pricing, Amazon API Gateway pricing, and/or AWS AppSync pricing.

16
New cards

What is Rate-based Rule in AWS WAF?

Rate-based Rules are type of Rule that can be configured in AWS WAF, allowing you to specify the number of web requests that are allowed by a client IP in a trailing, continuously updated, 5 minute period. If an IP address breaches the configured limit, new requests will be blocked until the request rate falls below the configured threshold.

17
New cards

How does a Rate-based rule compare to a regular AWS WAF Rule?

Rate-based Rules are similar to regular Rules, with one addition: the ability to configure a rate-based threshold. If, for example, the threshold for the Rate-based Rule is set to (say) 2,000, the rule will block all IPs that have more than 2,000 requests in the last 5 minute interval. A Rate-based Rule can also contain any other AWS WAF Condition that is available for a regular rule.

18
New cards

What does the Rate-based Rule cost?

A Rate-based Rule costs the same as a regular AWS WAF Rule which is $1 per rule per WebACL per month

19
New cards

What are the use cases for the Rate-based Rule?

Here are some popular use cases customers can address with Rate-based rules:

  • I want to block or count an IP address when that IP address exceeds the configured threshold rate (configurable in web requests per trailing 5 minute period)

  • I want to know which IP address are currently being blocked because they exceeded the configured threshold rate

  • I want IP addresses that have been added to the block list to be automatically removed when they are no longer violating the configured threshold rate

  • I want to exempt certain high-traffic source IP ranges from being blocked by my Rate-based rules

20
New cards

Are the existing matching conditions compatible with the Rate-base Rule?

Yes. Rate-based rules are compatible with existing AWS WAF match conditions. This allows you to further refine your match criteria and limit rate-based mitigations to specific URLs of your website or traffic coming from specific referrers (or user agents) or add other custom match criteria.

21
New cards

Can I use Rate-based rule to mitigate Web layer DDoS attacks?

Yes. This new rules type is designed to protect you from use cases such web-layer DDoS attacks, brute force login attempts and bad bots.

22
New cards

What visibility features does Rate-based Rules offer?

Rate-based Rules support all the visibility features currently available on the regular AWS WAF Rules. Additionally, they will get visibility into the IP addresses blocked as a result of the Rate-based Rule.

23
New cards

Can I use Rate-based rule to limit access to a certain parts of my Webpage?

Yes. Here is an example. Suppose that you want to limit requests to the login page on your website. To do this, you could add the following string match condition to a rate-based rule:

  • The Part of the request to filter on is “URI”.

  • The Match Type is “Starts with”.

  • A Value to match is “/login” (this need to be whatever identifies the login page in the URI portion of the web request)

Additionally, you would specify a Rate Limit of, say, 15,000 requests per 5 minutes. Adding this rate-based rule to a web ACL will limit requests to your login page per IP address without affecting the rest of your site.

24
New cards

Can I exempt certain high-traffic source IP ranges from being blocked by my Rate-based Rule(s)?

Yes. You can do this by having a separate IP match condition that allows the request within the Rate-base Rule.

25
New cards

How accurate is your GeoIP database?

The accuracy of the IP Address to country lookup database varies by region. Based on recent tests, our overall accuracy for the IP address to country mapping is 99.8%.

26
New cards

What are Managed Rules for AWS WAF?

Managed Rules are an easy way to deploy pre-configured rules to protect your applications common threats like application vulnerabilities like OWASP, bots, or Common Vulnerabilities and Exposures (CVE). AWS Managed Rules for AWS WAF are managed by AWS, whereas Managed Rules from AWS Marketplace is managed by third-party security sellers.

27
New cards

What is Account Takeover Prevention?

Account Takeover Prevention (ATP) is a managed rule group that monitors traffic to your application’s login page to detect unauthorized access to user accounts using compromised credentials. You can use ATP to prevent credential stuffing attacks, brute force login attempts, and other anomalous login activities. As login attempts are made to your application, ATP checks in real time whether the user names and passwords submitted have been compromised elsewhere on the web. Checking for anomalous login attempts coming from bad actors, ATP correlates requests seen over time to help you detect and mitigate brute force attempts and credential stuffing attacks. ATP also offers optional JavaScript and iOS/Android SDKs that can be integrated into your application to provide you with additional telemetry on user devices that attempt to log in to your application to better protect your application against automated login attempts by bots.

28
New cards

What is account creation fraud prevention?

Account Creation Fraud prevention (ACFP) is a paid managed rule group that allows you to detect and mitigate fake account creation attack against your sign-up or registration page. You can use ACFP to prevent promotional or sign-up abuse, loyalty or rewards abuse and phishing. As new accounts sign-up, ACFP verifies each credential (i.e., username and password) submitted, email domains used, and other information like phone numbers, address fields entered in real-time and blocks the sign-up attempt if any of this information is considered stolen, or has bad reputation. In addition, ACFP includes fraud risk predictions that you can use without requiring any deep knowledge of ML-based detection models. ACFP also offers recommended JavaScript and iOS/Android SDKs that can be integrated into your application to provide you with additional telemetry on user to better protect your application against automated login attempts by bots.