This rule states that ELB application load balancers must have Web Application Firewall (WAF) enabled to enhance security.
Rule | ELB application load balancers should have Web Application Firewall (WAF) enabled |
Framework | FedRAMP Low Revision 4 |
Severity | ✔ Medium |
Rule Description:
ELB application load balancers must have Web Application Firewall (WAF) enabled to ensure compliance with FedRAMP Low Revision 4 requirements. This rule helps protect web applications hosted on the load balancers from common web-based attacks, such as SQL injection, cross-site scripting (XSS), and application layer DDoS attacks.
Troubleshooting Steps:
If Web Application Firewall (WAF) is not enabled for the ELB application load balancer, follow these troubleshooting steps to enable it:
Necessary Code:
AWS CLI command to enable WAF on an existing ELB application load balancer:
aws wafv2 create-web-acl \ --name <WAF_ACL_NAME> \ --scope REGIONAL \ --default-action Action=ALLOW \ --rules "Action=BLOCK,Priority=1,RuleGroupReference='AWSManagedRulesAmazonIpReputationList'" "Action=BLOCK,Priority=2,RuleGroupReference='AWSManagedRulesCommonRuleSet'" "Action=BLOCK,Priority=3,RuleGroupReference='AWSManagedRulesKnownBadInputsRuleSet'" \ --tags Key=<TAG_KEY>,Value=<TAG_VALUE>
Note: Replace
<WAF_ACL_NAME>
with a suitable name for your Web Application Firewall. Adjust the list of rules within --rules
according to your specific requirements.Step-by-Step Guide for Remediation:
Follow these step-by-step instructions to enable Web Application Firewall (WAF) on an existing ELB application load balancer:
By following these steps, you can ensure that your ELB application load balancers comply with the FedRAMP Low Revision 4 requirements by enabling Web Application Firewall (WAF) for enhanced security.