This rule states that ELB application load balancers should have Web Application Firewall (WAF) enabled.
Rule | ELB application load balancers should have Web Application Firewall (WAF) enabled |
Framework | Federal Financial Institutions Examination Council (FFIEC) |
Severity | ✔ Medium |
Rule Description: Enable Web Application Firewall (WAF) for ELB application load balancers in compliance with the Federal Financial Institutions Examination Council (FFIEC).
To ensure compliance with FFIEC regulations, enable the Web Application Firewall (WAF) for your ELB (Elastic Load Balancer) application load balancers. The WAF provides an extra layer of security by inspecting and filtering traffic to your application at the application layer.
Troubleshooting Steps:
If you encounter any issues while enabling the WAF for your ELB application load balancers, follow these troubleshooting steps:
Verify IAM Permissions: Ensure that the IAM user or role used to enable the WAF has the necessary permissions. The user or role should have the "AWSWAFReadOnlyAccess" or "AWSWAFFullAccess" policy attached.
Check WAF Capacity: Confirm that you have sufficient WAF capacity units available in your AWS account. You can check this by navigating to the AWS WAF console and inspecting the "WAF Capacity Units" section. If there are no available units, you may need to request an increase in WAF capacity.
Verify ELB Configuration: Double-check the configuration of your ELB application load balancers. Ensure that they are correctly associated with the appropriate AWS resources, such as EC2 instances or AWS Lambda functions.
Review WAF Rules: Examine the WAF rules applied to your ELB. Make sure that the rules align with FFIEC requirements and adequately protect against common web application vulnerabilities, such as SQL injection or cross-site scripting attacks.
Monitor WAF Logs: Monitor the WAF logs to identify any potential issues or suspicious activities. The logs can provide valuable insights into the traffic passing through the WAF and help detect and mitigate potential security threats.
Necessary Codes:
There are no specific codes to enable WAF for ELB application load balancers. The process is performed through the AWS Management Console or AWS Command Line Interface (CLI).
Step-by-Step Guide for Remediation:
Follow these steps to enable Web Application Firewall (WAF) for your ELB application load balancers:
Log in to the AWS Management Console at https://console.aws.amazon.com.
Navigate to the AWS WAF service by clicking on "Services" in the top menu bar and selecting "WAF & Shield."
In the WAF & Shield console, select "Web ACLs" from the sidebar menu.
Click on the "Create web ACL" button.
Provide a name for your web ACL and an optional description to help identify it later.
Select the region where your ELB application load balancers are deployed.
Choose the rule group that aligns with the FFIEC requirements or create custom rules tailored to your specific needs.
Define the rules within the rule group to protect against common web application vulnerabilities.
Choose the action to take when a rule within the rule group is triggered. You can either allow the traffic or block requests that match the rule conditions.
Click on the "Next" button to review and create the web ACL.
Review the summary of your web ACL configuration and click on the "Create web ACL" button to enable the WAF.
Once the web ACL is created, navigate to your ELB application load balancer settings.
Click on the "Listeners" tab and select the appropriate listener.
In the "Edit Listener" screen, scroll down to find the "Default actions" section.
Click on the "Add action" button and select "Forward to web ACL" from the dropdown menu.
Choose the web ACL you created in step 5 from the list.
Click on the "Save" or "Update" button to apply the changes.
Wait a few minutes for the changes to propagate and the WAF to become fully operational.
Congratulations! You have successfully enabled Web Application Firewall (WAF) for your ELB application load balancers in compliance with FFIEC regulations. The WAF will now provide an additional layer of protection to your web applications by inspecting and filtering incoming traffic.