


When WAF associates with any of the above three AWS services, it associates with a Web ACL. Logging and Monitoring of WAF is handled by Kinesis Firehose and CloudWatch, respectively. AWS Application Load Balancer (Regional Service).The web application HTTP requests can be routed via AWS WAF and then forwarded to either of the AWS services. Of these, AWS WAF can be used to handle security threats such as SQL injections and Cross Site Scripting (XSS) in a typical web application. Bad Bots: Crawlers, Content Scrapers, Scanners and Probes.Application Vulnerabilities: SQL Injections, Cross Site Scripting (XSS), Open Web Application Security Project (OWASP), Common Vulnerabilities and Exposures (CVE).DDoS: Flood Attacks (SYN Floods, UDP Floods, ICMP Floods, HTTP Floods, DNS Query Floods), Reflection Attacks.

There are many security threats that exist today in a typical enterprise distributed application.
