Introducing a new console experience for AWS WAF
You can now use the updated experience to access AWS WAF functionality anywhere in the console. For more details, see Working with the updated console experience.
Associating or disassociating protection with an AWS resource
You can use AWS WAF to create the following associations between protection pack or web ACLs and your resources:
-
Associate a regional protection pack or web ACL with any of the regional resources listed below. For this option, the protection pack or web ACL must be in the same region as your resource.
Amazon API Gateway REST API
Application Load Balancer
AWS AppSync GraphQL API
Amazon Cognito user pool
AWS App Runner service
AWS Verified Access instance
AWS Amplify
-
Associate a global protection pack or web ACL with a Amazon CloudFront distribution. The global protection pack or web ACL will have a hard-coded Region of US East (N. Virginia) Region.
You can also associate a protection pack or web ACL with a CloudFront distribution when you create or update the distribution itself. For information, see Using AWS WAF to Control Access to Your Content in the Amazon CloudFront Developer Guide.
Restrictions on multiple associations
You can associate a single protection pack or web ACL with one or more AWS resources, according to the following restrictions:
-
You can associate each AWS resource with only one protection pack or web ACL. The relationship between protection pack or web ACL and AWS resources is one-to-many.
-
You can associate a protection pack or web ACL with one or more CloudFront distributions. You cannot associate a protection pack or web ACL that you have associated with a CloudFront distribution with any other AWS resource type.
Additional restrictions
The following additional restrictions apply to protection pack or web ACL associations:
-
You can only associate a protection pack or web ACL to an Application Load Balancer within AWS Regions. For example, you cannot associate a protection pack or web ACL to an Application Load Balancer that is on AWS Outposts.
-
You can't associate an Amazon Cognito user pool with a protection pack or web ACL that uses the AWS WAF Fraud Control account creation fraud prevention (ACFP) managed rule group
or the AWS WAF Fraud Control account takeover prevention (ATP) managed rule groupAWSManagedRulesACFPRuleSet
. For information about account creation fraud prevention, see AWS WAF Fraud Control account creation fraud prevention (ACFP). For information about account takeover prevention, see AWS WAF Fraud Control account takeover prevention (ATP).AWSManagedRulesATPRuleSet
Production traffic risk
Before you deploy your protection pack or web ACL for production traffic, test and tune it in a staging or testing environment until you are comfortable with the potential impact to your traffic. Then test and tune your rules in count mode with your production traffic before enabling them. For guidance, see Testing and tuning your AWS WAF protections.