Skip to content
A Terraform module to create AWF WAF Rules for OWASP Top 10 security risks protection.
Branch: master
Clone or download
Latest commit 8933a71 May 9, 2019
Type Name Latest commit message Commit time
Failed to load latest commit information.
examples/owasp-top-10 fix example (#5) May 9, 2019
.gitignore Initial commit Mar 19, 2019
LICENSE Initial commit Mar 19, 2019 Update Readme and Documentation (#4) May 9, 2019 Update Readme and Documentation (#4) May 9, 2019 initial development (#1) Mar 20, 2019 initial development (#1) Mar 20, 2019


OWASP Top 10 Most Critical Web Application Security Risks is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list[1]. You can read the document that they published here: [2].

This is a Terraform module which creates AWF WAF resources for protection of your resources from the OWASP Top 10 Security Risks. This module is based on the whitepaper that AWS provides. The whitepaper tells how to use AWS WAF to mitigate those attacks[3][4].

This module will only create match-sets[5], rules[6], and a rule group (optional)[7]. Those resources cannot be used without WebACL[8], which is not covered by this module.

To see the example on how to provision the resources only, check Examples section.

But to see the example on how to use this module together with WebACL to fully protect your application, see this page: [9]



  1. Can I use only some of the rules? Yes you can. This module will outputs the rules' ID. Attach to WebACL you created only the IDs of the rules that you want.
  2. Can I provision only some of the rules? No you can't. If you really want to do it, the only solution is to copy-paste match-sets and rules code manually. You must aware that by doing that you will lose support from maintainer of this module.
  3. Can I modify some match-sets of a rule? No you can't. The same answer to answer question number 2. But if you found something need to be fixed, e.g. match-sets causing lots of false positive, please don't hesitate to create an issue or a pull request to this repository!


Related Modules


Rafi Kurnia Putra


Apache 2 Licensed. See LICENSE for full details.

You can’t perform that action at this time.