CCSS (Common Configuration Scoring System) is a set of measures used to determine the severity of the rule.
Each rule is associated with a high-level category. For example IAM, Container, Monitoring, Logging, Network, etc.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsWAF should be deployed on CloudFront distributions to protect web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources.
Set the web_acl_id attribute to an existing AWS WAF web ACL ARN.
Example configuration:
resource "aws_cloudfront_distribution" "s3_distribution" {
web_acl_id = "${aws_waf_web_acl.waf_acl.id}"
origin {
domain_name = "${aws_s3_bucket.http-monitor-origin.bucket_regional_domain_name}"
origin_id = "${aws_s3_bucket.http-monitor-origin.id}"
}
enabled = true
restrictions {
geo_restriction {
restriction_type = "whitelist"
locations = ["US", "CA", "GB", "DE"]
}
}
viewer_certificate {
cloudfront_default_certificate = true
}
default_cache_behavior {
allowed_methods = ["DELETE", "GET", "HEAD", "OPTIONS", "PATCH", "POST", "PUT"]
cached_methods = ["GET", "HEAD"]
target_origin_id = "${aws_s3_bucket.http-monitor-origin.id}"
forwarded_values {
query_string = false
cookies {
forward = "none"
}
}
viewer_protocol_policy = "redirect-to-https"
min_ttl = 0
default_ttl = 3600
max_ttl = 86400
}
}
Set Properties.DistributionConfig.WebACLId attribute to existing AWS WAF acl ARN.