AWS::WAFv2::RuleGroup SqliMatchStatement - Amazon CloudFormation
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

AWS::WAFv2::RuleGroup SqliMatchStatement

A rule statement that inspects for malicious SQL code. Attackers insert malicious SQL code into web requests to do things like modify your database or extract data from it.

Syntax

To declare this entity in your Amazon CloudFormation template, use the following syntax:

Properties

FieldToMatch

The part of the web request that you want Amazon WAF to inspect.

Required: Yes

Type: FieldToMatch

Update requires: No interruption

SensitivityLevel

The sensitivity that you want Amazon WAF to use to inspect for SQL injection attacks.

HIGH detects more attacks, but might generate more false positives, especially if your web requests frequently contain unusual strings. For information about identifying and mitigating false positives, see Testing and tuning in the Amazon WAF Developer Guide.

LOW is generally a better choice for resources that already have other protections against SQL injection attacks or that have a low tolerance for false positives.

Default: LOW

Required: No

Type: String

Allowed values: LOW | HIGH

Update requires: No interruption

TextTransformations

Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass detection. If you specify one or more transformations in a rule statement, Amazon WAF performs all transformations on the content of the request component identified by FieldToMatch, starting from the lowest priority setting, before inspecting the content for a match.

Required: Yes

Type: Array of TextTransformation

Minimum: 1

Update requires: No interruption