Last November at F5’s booth at AWS re:Invent, we polled IT professionals on whether their biggest app challenge results from security, skills deficiency, or cloud migration complexity. Unsurprisingly, the leading concern by far was security – after all, web application attacks were the #1 source of data breaches in 2017, according to Verizon.
Now, not all applications are the same, and therefore the security requirements differ depending on a number of factors, including business purpose, deployment location, sensitivity or importance of user data, and regulatory requirements. And for certain applications, the advanced functionality and protection offered by enterprise-grade web application firewalls (such as F5’s BIG-IP ASM) may not be required, at least not initially, and a more basic firewall like a cloud provider’s native WAF will suffice.
For those builders who have, or are thinking about implementing, an AWS WAF to front their applications, we have some exciting news. AWS has just announced the availability of new F5 managed security rules products on AWS WAF. These products can be used in conjunction with the native AWS WAF to bolster the overall security posture of your applications. F5 has developed 3 separate rulesets – each providing unique protection against varying threat types. These are:
- Bot Protection – Prevents malicious bot activities such as vulnerability scanners, web scrapers, DDoS tools, and forum spam tools.
- CVE Vulnerabilities – Protects from common vulnerabilities and exposures (CVE) targeting systems such as Apache, Bash, Java, MySQL, Ruby On Rails, and WordPress.
- Web Exploits – Guards against attacks that are part of OWASP Top 10 threats, including cross-site scripting, SQL injection, path traversal, and predictable resource.
All rules are written, managed, and updated regularly by F5 security experts, so you never need worry about manually updating versions to protect against emerging vulnerabilities. In addition, you can add these advanced WAF capabilities to your native AWS WAF in a few clicks, apply them to specific applications, and only pay for what you use on a pay-as-you-go utility model without contracts or other commitments.
This integrated solution gives builders an easy way to take advantage of F5’s industry-leading WAF for their AWS applications.
Additional Resources
- Key Considerations In Choosing a WAF
- F5 BIG-IP Application Security Manager (ASM) Product Page
- Customer Case Study – F5 WAF on AWS
About the Author
Related Blog Posts

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.
F5 Silverline Mitigates Record-Breaking DDoS Attacks
Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.
F5 Silverline: Our Data Centers are your Data Centers
Customers count on F5 Silverline Managed Security Services to secure their digital assets, and in order for us to deliver a highly dependable service at global scale we host our infrastructure in the most reliable and well-connected locations in the world. And when F5 needs reliable and well-connected locations, we turn to Equinix, a leading provider of digital infrastructure.
Volterra and the Power of the Distributed Cloud (Video)
How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.
Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.
The Internet of (Increasingly Scary) Things
There is a lot of FUD (Fear, Uncertainty, and Doubt) that gets attached to any emerging technology trend, particularly when it involves vast legions of consumers eager to participate. And while it’s easy enough to shrug off the paranoia that bots...