F5 Managed Rules for AWS Web Application Firewall
2
The Need for Enhanced Security in the Cloud
A recent report established that a staggering 52% of all data breaches were traced back to
attacks on web applications
1
, making these targeted attacks the single biggest cause of data
breaches. When coupled with rapidly accelerating digital transformation eorts built around
cloud-first and cloud-only strategies, the need for application protection in the cloud is clearer
now than ever before.
However, not all applications are created equal. Dierent applications have dierent security
requirements based on a number of factors, including business purpose, deployment location,
sensitivity of user data, and regulatory requirements. For certain applications, the advanced
functionality and protection oered by enterprise-grade web application firewalls such as
F5®Advanced Web Application Firewall™ may not be required—at least not initially—and a
cloud-native firewall like AWS Web Application Firewall (WAF) may be sucient.
Thanks to its simple deployment, ease of use, and relatively inexpensive pricing model,
thousands of organizations have taken this stance and deployed the AWS WAF to help
protect their apps. To combat the growing complexity and sophistication of application
layer threats, however, security teams now have the opportunity to strengthen their security
posture through the AWS WAF support for managed rulesets.
F5 Managed Rules for AWS WAF
F5 Managed Rules for AWS WAF oer an additional layer of protection against a range
of malicious threats and are easily applied to your AWS WAF instances. From bot and API
protection, to defense against web exploits and common app vulnerabilities, these rulesets
go above and beyond the AWS WAF protection to help keep your apps and data secure.
Protection provided by each of the four F5 rulesets includes:
• Bot Protection Ruleset—Analyzes all incoming requests and blocks any malicious
botactivities including DDoS tools, vulnerability scanners, web scraper, and forum
spam tools.
• OWASP Top 10 Web Exploits Protection Ruleset—Mitigates attacks that seek to exploit
vulnerabilities contained in the OWASP Top 10, including cross-site scripting (XSS)
attacks, injection attacks, and many more.
KEY BENEFITS
Plug & Play
No security expertise needed—
simply attach F5 WAF rules to
your AWS Web App Firewall (WAF)
or Application Load Balancer
(ALB) to bolster your security
posture.
Fast, Simple Deployment
Attach F5 WAF rules to your
AWS WAF in a matter of minutes
by following three simple
deployment steps.
Extensive Protection
Augment your AWS WAF with a
selection of four unique rulesets,
each oering protection against
specific application threats.
Continuous Updates
Rulesets are monitored,
maintained, and updated by
F5 security experts to ensure
protection against evolving
threats.
Pay As You Go
Add and remove rulesets as
needed—no commitments or
contracts; you simply pay for the
rules you use on an hourly basis.