Voiced by Amazon Polly |
Security
Application Security is the practice of ensuring that software applications are protected from various threats and vulnerabilities throughout their lifecycle, from design and development to deployment and beyond.
Freedom Month Sale — Upgrade Your Skills, Save Big!
- Up to 80% OFF AWS Courses
- Up to 30% OFF Microsoft Certs
Security Threats
- Application-Layer DDoS Attacks: An attacker sends thousands of HTTP GET requests per second to an application page. The requests appear normal, but they overload the web server and deny access to real customers.
- Bot Traffic & Credential Stuffing: Type of automated cyberattack where malicious bots attempt to log in to user accounts by rapidly trying different username and password combinations — often stolen from previous data breaches.
- Geolocation-Based Access Control: Geolocation-based access control is a security method that restricts or allows access to systems, applications, or data based on the user’s physical location, as identified through their IP address or GPS data.
- Custom Rules & Rate Limiting: Custom rules and rate limiting are security techniques used to control web traffic. Custom rules allow organizations to define specific conditions for blocking or allowing requests, while rate limiting restricts the number of requests a user or IP can make in a set time frame to prevent abuse or attacks.
- SQL Injection (SQLi) & Cross-Site Scripting (XSS): Type of ccommon web application attacks. SQLi targets databases by injecting malicious SQL commands, while XSS involves injecting harmful scripts into web pages to steal user data or hijack sessions.
AWS Web Application Firewall (WAF)
- AWS WAF is a web application firewall that helps detect and block malicious web requests targeted at your web applications.
- Provides web traffic filtering
- Provide Application Layer protection
- Provides real-time metrics
- Protect your web applications from common web exploits
AWS WAF Use Cases
- IP Blocking and Allowlisting
- Rate-Based Rules (Throttling) and Size Constraints Rule
- Geo-Blocking
- Prevent SQL injection, cross-site scripting (XSS), and other common web exploits.
- Real-time Visibility and Logging
- Custom Rule Sets for APIs
- Integration with AWS Shield
Steps to Configure Web ACLs and Rule Group:
In this blog we will configure web ACL for Application running on EC2 server behind Application Load Balancer.
The demo web URL avinashbundela.link is configured to route traffic through an Application Load Balancer, which directs requests to the appropriate backend application servers.
To configure AWS WAF Web ACL for the URL avinashbundela.link (which is mapped to an Application Load Balancer), follow these steps:
Prerequisites
- Your domain (avinashbundela.link) should already be routed through ALB (Application Load Balancer).
- AWS WAF is available in us-east-1 or global, depending on the resource.
Step 1: Go to AWS WAF Console
- Open the AWS WAF & Shield console:
https://console.aws.amazon.com/wafv2/
Step 2: Create Web ACL
- Click on “Create web ACL”.
- Enter a Name (e.g., WAF-avinashbundela).
- Resource type: Select “Regional resources”.
- Associated AWS resource: Choose Application Load Balancer (ALB).
- Select your ALB (mapped with avinashbundela.link) from the list.
Step 3: Add Rules (Optional but Recommended)
You can add rules now or later. Some common options:
- Managed rule groups (recommended):
- AWSManagedRulesCommonRuleSet
- AWSManagedRulesKnownBadInputsRuleSet
- Custom rules:
- Block IPs
- Limit request rate (Rate-based rule)
- Allow only specific countries (GeoMatch)
Example:
Create a custom AWS WAF rule to block traffic from a specific country.
Step 4: Set Default Action
Choose:
- Allow (default unless overridden by rules)
- Block (only allow requests that match “Allow” rules)
Typically, choose Allow if you have blocking rules in place.
Step 5: Review & Create
- Review your settings and rules.
- Click “Create Web ACL”.
Step 6: Web ACL Is Now Active
- The Web ACL will now filter all traffic through your ALB (avinashbundela.link).
Now check the same URL (avinashbundela.link)again — you will notice that access from India is no longer allowed.
Conclusion
- Comprehensive Protection: Safeguards applications threats, including SQL injection, XSS, and DDoS attacks.
- Customizable Security: Create tailored rules to meet specific application needs, enhancing control over web traffic.
- Seamless Integration: Works effortlessly with AWS services like CloudFront, ALB, and API Gateway, ensuring robust security across your infrastructure.
- Real-Time Monitoring: Provides near real-time visibility into web traffic, enabling prompt detection and response to potential threats.
- Cost-Effective: Adopts a pay-as-you-go model, allowing businesses to scale security measures without incurring unnecessary costs.
Freedom Month Sale — Discounts That Set You Free!
- Up to 80% OFF AWS Courses
- Up to 30% OFF Microsoft Certs
About CloudThat
CloudThat is an award-winning company and the first in India to offer cloud training and consulting services worldwide. As a Microsoft Solutions Partner, AWS Advanced Tier Training Partner, and Google Cloud Platform Partner, CloudThat has empowered over 850,000 professionals through 600+ cloud certifications winning global recognition for its training excellence including 20 MCT Trainers in Microsoft’s Global Top 100 and an impressive 12 awards in the last 8 years. CloudThat specializes in Cloud Migration, Data Platforms, DevOps, IoT, and cutting-edge technologies like Gen AI & AI/ML. It has delivered over 500 consulting projects for 250+ organizations in 30+ countries as it continues to empower professionals and enterprises to thrive in the digital-first world.

WRITTEN BY Avinash Singh Bundela
Comments