Skip to content

Commit a7d940f

Browse files
authored
Merge pull request #224 from awslabs/release/v3.2.1-1
updated the stack parameters description about overwriting customizat…
2 parents aefb028 + 7df043b commit a7d940f

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

deployment/aws-waf-security-automations.template

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -114,9 +114,9 @@ Parameters:
114114
- 'yes - NO_MATCH'
115115
- 'no'
116116
Description: >-
117-
Choose yes to enable the component designed to block common SQL injection attacks. You can also select an option you want AWS WAF to handle oversized request exceeding 8 KB (8192 bytes).
118-
By default 'yes' uses CONTINUE option, which inspects the request component contents that are within the size limitations normally according to the rule inspection criteria.
119-
For more information, see https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-oversize-handling.html.
117+
Choose yes to deploy the default SQL injection protection rule designed to block common SQL injection attacks.
118+
It uses CONTINUE option for oversized request handling by default. Note: If you customized the rule outside of CloudFormation,
119+
your changes will be overwritten after stack update.
120120

121121
SqlInjectionProtectionSensitivityLevelParam:
122122
Type: String
@@ -125,10 +125,10 @@ Parameters:
125125
- 'LOW'
126126
- 'HIGH'
127127
Description: >-
128-
Choose the sensitivity level that you want AWS WAF to use to inspect for SQL injection attacks. HIGH detects more attacks, but might generate more false positives.
129-
LOW is generally a better choice for resources that already have other protections against SQL injection attacks or that have a low tolerance for false positives.
130-
For more information, see https://aws.amazon.com/about-aws/whats-new/2022/07/aws-waf-sensitivity-levels-sql-injection-rule-statements/.
128+
Choose the sensitivity level used by WAF to inspect for SQL injection attacks.
131129
If you choose to deactivate SQL injection protection, ignore this parameter.
130+
Note: The stack deploys the default SQL injection protection rule into your AWS account.
131+
If you customized the rule outside of CloudFormation, your changes will be overwritten after stack update.
132132

133133
ActivateCrossSiteScriptingProtectionParam:
134134
Type: String
@@ -139,9 +139,9 @@ Parameters:
139139
- 'yes - NO_MATCH'
140140
- 'no'
141141
Description: >-
142-
Choose yes to enable the component designed to block common SQL injection attacks. You can also select an option you want AWS WAF to handle oversized request exceeding 8 KB (8192 bytes).
143-
By default 'yes' uses CONTINUE option, which inspects the request component contents that are within the size limitations normally according to the rule inspection criteria.
144-
For more information, see https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-oversize-handling.html.
142+
Choose yes to deploy the default cross-site scripting protection rule designed to block common cross-site scripting attacks.
143+
It uses CONTINUE option for oversized request handling by default. Note: If you customized the rule outside of CloudFormation,
144+
your changes will be overwritten after stack update.
145145

146146
ActivateHttpFloodProtectionParam:
147147
Type: String

0 commit comments

Comments
 (0)