This rule highlights the necessity of enabling Web Application Firewall for ELB application load balancers.
Rule | ELB application load balancers should have Web Application Firewall (WAF) enabled |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ Medium |
Rule Description:
ELB application load balancers should have Web Application Firewall (WAF) enabled for NIST 800-171 Revision 2. This rule ensures compliance with NIST 800-171 Revision 2, which requires the use of a Web Application Firewall (WAF) to protect against common web application security vulnerabilities.
Description:
The Web Application Firewall (WAF) is a security firewall that examines incoming HTTP/HTTPS traffic and filters out malicious requests based on rules. By enabling the WAF feature on the ELB application load balancer, you can add an additional layer of protection to your web applications, reducing the risk of potential attacks.
Troubleshooting Steps:
If you encounter any issues while enabling the WAF on your ELB application load balancer, follow these troubleshooting steps:
Necessary Codes (if any):
No specific codes are required for this rule. Enabling the WAF on the ELB application load balancer is done through the AWS Management Console or AWS CLI commands.
Step-by-step Guide for Remediation:
Follow these steps to enable Web Application Firewall (WAF) on your ELB application load balancer:
Conclusion:
Enabling the Web Application Firewall (WAF) on your ELB application load balancer provides an additional layer of security to protect your web applications against potential security vulnerabilities. By following the step-by-step guide for remediation, you can easily enable WAF and comply with the NIST 800-171 Revision 2 standard. Regularly monitor and update your WAF rules to ensure continuous protection against evolving threats.