Associating or disassociating protection with an AWS resource - AWS WAF, AWS Firewall Manager, AWS Shield Advanced, and AWS Shield network security director

Introducing a new console experience for AWS WAF

You can now use the updated experience to access AWS WAF functionality anywhere in the console. For more details, see Working with the updated console experience.

Associating or disassociating protection with an AWS resource

You can use AWS WAF to create the following associations between protection pack or web ACLs and your resources:

  • Associate a regional protection pack or web ACL with any of the regional resources listed below. For this option, the protection pack or web ACL must be in the same region as your resource.

    • Amazon API Gateway REST API

    • Application Load Balancer

    • AWS AppSync GraphQL API

    • Amazon Cognito user pool

    • AWS App Runner service

    • AWS Verified Access instance

    • AWS Amplify

  • Associate a global protection pack or web ACL with a Amazon CloudFront distribution. The global protection pack or web ACL will have a hard-coded Region of US East (N. Virginia) Region.

You can also associate a protection pack or web ACL with a CloudFront distribution when you create or update the distribution itself. For information, see Using AWS WAF to Control Access to Your Content in the Amazon CloudFront Developer Guide.

Restrictions on multiple associations

You can associate a single protection pack or web ACL with one or more AWS resources, according to the following restrictions:

  • You can associate each AWS resource with only one protection pack or web ACL. The relationship between protection pack or web ACL and AWS resources is one-to-many.

  • You can associate a protection pack or web ACL with one or more CloudFront distributions. You cannot associate a protection pack or web ACL that you have associated with a CloudFront distribution with any other AWS resource type.

Additional restrictions

The following additional restrictions apply to protection pack or web ACL associations:

  • You can only associate a protection pack or web ACL to an Application Load Balancer within AWS Regions. For example, you cannot associate a protection pack or web ACL to an Application Load Balancer that is on AWS Outposts.

  • You can't associate an Amazon Cognito user pool with a protection pack or web ACL that uses the AWS WAF Fraud Control account creation fraud prevention (ACFP) managed rule group AWSManagedRulesACFPRuleSet or the AWS WAF Fraud Control account takeover prevention (ATP) managed rule group AWSManagedRulesATPRuleSet. For information about account creation fraud prevention, see AWS WAF Fraud Control account creation fraud prevention (ACFP). For information about account takeover prevention, see AWS WAF Fraud Control account takeover prevention (ATP).

Production traffic risk

Before you deploy your protection pack or web ACL for production traffic, test and tune it in a staging or testing environment until you are comfortable with the potential impact to your traffic. Then test and tune your rules in count mode with your production traffic before enabling them. For guidance, see Testing and tuning your AWS WAF protections.