-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathacl.tf
74 lines (57 loc) · 1.2 KB
/
acl.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
#TODO: add rules conditionally OR add aws_wafregional_web_acl_rule resource
resource "aws_wafregional_web_acl" "WAFWebACL" {
name = "WebACL-${var.ENVIRONMENT}-1"
metric_name = "SecurityAutomationsMaliciousRequesters"
default_action {
type = "ALLOW"
}
rule {
action {
type = "ALLOW"
}
priority = 10
rule_id = "${aws_wafregional_rule.WAFWhitelistRule.id}"
}
rule {
action {
type = "BLOCK"
}
priority = 20
rule_id = "${aws_wafregional_rule.WAFBlacklistRule.id}"
}
rule {
action {
type = "BLOCK"
}
priority = 40
rule_id = "${aws_wafregional_rule.WAFIPReputationListsRule1.id}"
}
rule {
action {
type = "BLOCK"
}
priority = 50
rule_id = "${aws_wafregional_rule.WAFIPReputationListsRule2.id}"
}
rule {
action {
type = "BLOCK"
}
priority = 60
rule_id = "${aws_wafregional_rule.WAFBadBotRule.id}"
}
rule {
action {
type = "BLOCK"
}
priority = 70
rule_id = "${aws_wafregional_rule.WAFSqlInjectionRule.id}"
}
rule {
action {
type = "BLOCK"
}
priority = 80
rule_id = "${aws_wafregional_rule.WAFXssRule.id}"
}
}