AWS WAF
요약
AWS managed rule groups 에서 Free 로 제공되는 rule groups가 있음. 그런데 제공하는 항목들이 많아서 세부적인 내용을 파악하는데는 시간이 걸릴 것으로 보임
free로 제공되는 것중 Core rule set 에서 OWASP Top 10 를 포함한 OWASP 에 해당하는 rule을 제공하지만 이것도 22가지 정도가 됨.
AWS WAF
https://aws.amazon.com/ko/waf/
[기술 백서] AWS WAF를 통해 OWASP 상위 10 웹 애플리케이션 취약점 방어하기
한국어 기술백서-AWS WAF 를 활용한 OWASP Top 10 웹애플리케이션 취약점 보완 방법
managed rule groups
AWS managed rule groups
region 별로 지원되는 것이 다름. rule groups 를 선택하면 세부적으로 설정하는 옵션이 나옴.
Paid rule groups
Name | Capacity | Action |
---|---|---|
Bot ControlAWS WAF Bot Control offers you protection against automated bots that can consume excess resources, skew business metrics, cause downtime, or perform malicious activities. Bot Control provides additional visibility through Amazon CloudWatch and generates labels that you can use to control bot traffic to your applications. | 50 | Add to web ACL |
Free rule groups
Name | Capacity | Action |
---|---|---|
Admin protectionContains rules that allow you to block external access to exposed admin pages. This may be useful if you are running third-party software or would like to reduce the risk of a malicious actor gaining administrative access to your application. | 100 | Add to web ACL |
Amazon IP reputation listThis group contains rules that are based on Amazon threat intelligence. This is useful if you would like to block sources associated with bots or other threats. | 25 | Add to web ACL |
Anonymous IP listThis group contains rules that allow you to block requests from services that allow obfuscation of viewer identity. This can include request originating from VPN, proxies, Tor nodes, and hosting providers (including AWS). This is useful if you want to filter out viewers that may be trying to hide their identity from your application. | 50 | Add to web ACL |
Core rule setContains rules that are generally applicable to web applications. This provides protection against exploitation of a wide range of vulnerabilities, including those described in OWASP publications. | 700 | Add to web ACL |
Known bad inputsContains rules that allow you to block request patterns that are known to be invalid and are associated with exploitation or discovery of vulnerabilities. This can help reduce the risk of a malicious actor discovering a vulnerable application. | 200 | Add to web ACL |
Linux operating systemContains rules that block request patterns associated with exploitation of vulnerabilities specific to Linux, including LFI attacks. This can help prevent attacks that expose file contents or execute code for which the attacker should not have had access. | 200 | Add to web ACL |
PHP applicationContains rules that block request patterns associated with exploiting vulnerabilities specific to the use of the PHP, including injection of unsafe PHP functions. This can help prevent exploits that allow an attacker to remotely execute code or commands. | 100 | Add to web ACL |
POSIX operating systemContains rules that block request patterns associated with exploiting vulnerabilities specific to POSIX/POSIX-like OS, including LFI attacks. This can help prevent attacks that expose file contents or execute code for which access should not been allowed. | 100 | Add to web ACL |
SQL databaseContains rules that allow you to block request patterns associated with exploitation of SQL databases, like SQL injection attacks. This can help prevent remote injection of unauthorized queries. | 200 | Add to web ACL |
Windows operating systemContains rules that block request patterns associated with exploiting vulnerabilities specific to Windows, (e.g., PowerShell commands). This can help prevent exploits that allow attacker to run unauthorized commands or execute malicious code. | 200 | Add to web ACL |
WordPress applicationThe WordPress Applications group contains rules that block request patterns associated with the exploitation of vulnerabilities specific to WordPress sites. | 100 | Add to web ACL |
Marketplace 에 있는 WAF managed rules
https://aws.amazon.com/marketplace/solutions/security/waf-managed-rules
설정
https://docs.aws.amazon.com/ko_kr/waf/latest/developerguide/aws-managed-rule-groups.html
개별 web ACL configuration 설정에서 “Override rule group action to count” 을 선택하면 정당한 트래픽이 차단되지 않는다. AWS WAF sampled requests 또는 AWS WAF logs 에서 오탐되는 것을 찾아서 설정을 조정한다.
https://docs.aws.amazon.com/ko_kr/waf/latest/developerguide/aws-managed-rule-groups-list.html
https://docs.aws.amazon.com/ko_kr/waf/latest/developerguide/aws-managed-rule-groups-baseline.html
핵심 규칙 집합 (CRS) 관리형 규칙 그룹
VendorName: AWS
, 이름: AWSManagedRulesCommonRuleSet
, WCU: 700
핵심 규칙 집합(CRS, Core rule set) 규칙 그룹에는 일반적으로 웹 애플리케이션에 적용할 수 있는 규칙이 포함되어 있습니다. 이러한 규칙은 다음과 같은 OWASP 발행물에 설명된 자주 발생하고 위험성 높은 취약성을 포함하여 광범위한 취약성을 악용하는 일이 없도록 보호합니다.OWASP 상위 10. AWS WAF 사용 사례에서 이 규칙 그룹을 사용하는 방법을 고려합니다.