π‘οΈ AWS WAF Rule Group has no WAF Rulesπ’
- Contextual name: π‘οΈ Rule Group has no WAF Rulesπ’
- ID:
/ce/ca/aws/waf/rule-group-without-rules - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ π’
- π AWS WAF Rule Group
- π§ͺ test-data.json
Similar Policiesβ
- AWS Security Hub: [WAF.3] AWS WAF Classic Regional rule groups should have at least one rule
- AWS Security Hub: [WAF.7] AWS WAF Classic global rule groups should have at least one rule
Descriptionβ
Descriptionβ
This policy identifies AWS WAF Rule Groups that do not contain any rules. A rule group is a reusable collection of rules that can be added to a Web ACL to help manage and apply consistent web request filtering across applications. A rule group without any rules does not perform any inspection or filtering and therefore provides no protection.
Rationaleβ
An empty rule group typically indicates an incomplete configuration or a resource that was created but never fully implemented. Keeping such unused resources can create configuration drift, increase management complexity, and lead to a false sense of security if administrators assume the rule group is active and providing protection when it is not.
Auditβ
This policy flags an AWS WAF Rule Group as
INCOMPLIANTif it does not have any associated AWS WAF Rules.
Remediationβ
Remediationβ
Add Rules to the Rule Groupβ
A rule group must contain at least one rule to filter or inspect web requests. If a rule group is empty, add rules that define how AWS WAF should evaluate and act on incoming requests.
Before applying changes to rule groups that are currently in use, test and tune the configuration in a staging or testing environment to evaluate its impact. Then, test the updated rules in count mode with production traffic before enabling them to enforce actions.
From Consoleβ
Select the rule group you want to edit.
- If the rule group is not visible, check the Region setting.
- For rule groups used with Amazon CloudFront, select the Global (CloudFront) Region.
On the rule group page, choose Edit to modify its configuration.
Add one or more rules defining match conditions such as IP sets, string matches, or rate-based filters, and specify the desired action (Allow, Block, or Count).
Save the configuration. The console automatically applies your updates to any web ACLs using the rule group.
... see more