API Gateway stage missing WAF

firetail:aws-api-gateway-v1-stage-missing-waf

Type:

CSPM

Rule Severity:

Low

The AWS API Gateway stage is currently deployed without an attached Web Application Firewall (WAF).

This leaves the API endpoint vulnerable to various web-based attacks such as SQL injection, cross-site scripting (XSS), and other common threats. Without AWS WAF in place, the API becomes more susceptible to attacks that could lead to data breaches, service disruptions, or the compromise of sensitive information. This weakens the API Gateway's overall security posture, increasing the risk of unauthorized access and malicious activities.

Remediation

To secure the API Gateway stage, attach an AWS WAF to the stage. This will help to filter and block malicious web requests, protecting the API from common threats and reducing the risk of unauthorized access or exploitation.

Example Attack Scenario

An attacker might attempt to exploit a vulnerability in the API Gateway by sending malicious input, such as an SQL injection payload, in a web request. Without a WAF, the malicious request could pass through to the backend system, potentially allowing the attacker to manipulate the database or gain unauthorized access to sensitive data. By attaching a WAF, malicious requests like these would be detected and blocked before they reach the API, preventing potential exploitation and ensuring that only legitimate traffic is processed.

How to Identify with Example Scenario

How to Resolve with Example Scenario

How to Identify with Example Scenario

Find the text in bold to identify issues such as these in API specifications

How to Resolve with Example Scenario

Modify the text in bold to resolve issues such as these in API specifications
References:

More findings

All Findings