opkear.blogg.se

Aws waf terraform
Aws waf terraform










aws waf terraform

aws waf terraform

match-sets causing lots of false positive, please don't hesitate to create an issue or a pull request to this repository! But if you found something need to be fixed, e.g. The same answer to answer question number 2.

  • Can I modify some match-sets of a rule? No you can't.
  • You must aware that by doing that you will lose support from maintainer of this module. If you really want to do it, the only solution is to copy-paste match-sets and rules code manually.
  • Can I provision only some of the rules? No you can't.
  • Attach to WebACL you created only the IDs of the rules that you want.
  • Can I use only some of the rules? Yes you can.
  • To see the example on how to provision the resources only, check Examples section.īut to see the example on how to use this module together with WebACL to fully protect your application, see this page: Those resources cannot be used without WebACL, which is not covered by this module. This module will only create match-sets, rules, and a rule group (optional).

    aws waf terraform

    The whitepaper tells how to use AWS WAF to mitigate those attacks. This module is based on the whitepaper that AWS provides. This is a Terraform module which creates AWF WAF resources for protection of your resources from the OWASP Top 10 Security Risks. You can read the document that they published here. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. It represents a broad consensus about the most critical security risks to web applications. OWASP Top 10 Most Critical Web Application Security Risks is a powerful awareness document for web application security. Hi everyone, this module is now deprecated and will no longer be supported or updated.įor Travelokans, please contact the Cloud Infra Team on slack to discuss WAFv2 implementation Description












    Aws waf terraform