Aws-web Appilication Firewall

Aws-web Appilication Firewall

Diagram showing how AWS WAF integrates with other AWS services to protect your web applications from exploits.


In the ever-evolving landscape of cybersecurity, safeguarding your web applications against malicious attacks is paramount. Amazon Web Services (AWS) provides a robust solution in the form of AWS WAF (Web Application Firewall), offering advanced protection and control over your web applications. In this comprehensive guide, we'll explore the key features, benefits, and best practices of AWS WAF, empowering you to fortify your online assets against potential threats.

  1. Understanding AWS WAF: AWS WAF is a cloud-based web application firewall that helps protect your web applications from common web exploits. It enables you to create custom rules to filter and monitor HTTP and HTTPS traffic, allowing you to mitigate security risks and ensure the availability and integrity of your applications.

  2. Key Features and Capabilities: a. Rule Creation: AWS WAF allows you to create custom rules to filter, allow, block, or monitor web requests based on various conditions such as IP addresses, HTTP headers, query parameters, and more.

  3. Managed Rule Sets: AWS WAF comes with pre-configured managed rule sets that can be easily integrated to protect against common web attacks like SQL injection, cross-site scripting (XSS), and more. This ensures a quick and effective defense mechanism without the need for extensive manual configuration.

  4. Integration with AWS Services: Seamlessly integrate AWS WAF with other AWS services like Amazon CloudFront, AWS Application Load Balancer, and Amazon API Gateway, providing a holistic approach to securing your web applications.

Benefits of AWS WAF:

  1. Enhanced Security: Protect your applications from a wide range of web exploits and attacks, ensuring the confidentiality, integrity, and availability of your online assets.

  2. Flexibility and Customization: Tailor security rules to meet the specific needs of your applications, allowing for granular control over the filtering and monitoring of web traffic.

  3. Cost-Effective: With a pay-as-you-go pricing model, AWS WAF offers cost-effective security measures, eliminating the need for upfront investments in hardware or infrastructure.

Best Practices for Implementing AWS WAF:

  1. Regularly Update Managed Rule Sets: Keep your web applications protected by staying up-to-date with the latest managed rule sets provided by AWS WAF. This ensures that your security measures align with emerging threats and vulnerabilities.

  2. Monitor and Analyze Web Traffic: Utilize AWS WAF logging and monitoring features to gain insights into your web traffic. Regularly review and analyze logs to identify patterns or anomalies that may indicate potential security risks.

  3. Conduct Regular Security Audits: Perform routine security audits to assess the effectiveness of your AWS WAF configuration. This proactive approach allows you to identify and address potential vulnerabilities before they can be exploited.

Lets's do demo......

Amazon Web Services (AWS) Web Application Firewall (WAF) Service Delivery  in Dubai, Abu Dhabi and UAE


  1. login into the AWS CONSOLE.

  2. Create aws ec2 instances (2 or more) in that instances host any sample application for demo purpose.


    sudo yum update -y

    sudo yum upgrade -y

    sudo yum install httpd -y

    sudo systemctl enable httpd

    sudo systemctl start httpd

    check the httpd is running or not using public of instances.


  1. Create a Target group for the common connection for those Ec2 instances.

  2. Now create a Application Load Balancer and connect to target group.

    Check the load balancer DNS url if it is work or not.


  1. Now create a AWS WAF for our application to Ec2 instances.

  2. Before the creation of AWS WAF create ip sets.

    Enter IP set rule name.

    Choose region and IP version.

    Add the IP address list.

    1. Create Web ACL (access control list).

      Add rule and rule groups.

      Follow the default steps to create Web-Acl's and finally you created the web acl.

Try to access a load balancer from the IP which is define in the IP sets rules group We get 403 forbidden message because WAF block that IP.

403 Forbidden error, it means that you do not have permission to view the requested file or resource.

It means for my local server ip dont have access to http appication inside the ec2 instance. The AWS WAF blocking my IP address to access.

If you want to see the waf dashbord which is blocking or access.

Go to webAcl.

From WEB ACL we filter the traffic and check all details Like blocked, allowed IP, Sample of bot detection, client device types, attack type, top 10 countries, etc...

Thank you.................

Did you find this article valuable?

Support ASHOK SANA by becoming a sponsor. Any amount is appreciated!