Listing Thumbnail

    Cyber Security Cloud Managed Rules for AWS WAF -HighSecurity OWASP Set-

     Info
    Deployed on AWS
    Cyber Security Cloud Managed Rules are designed to mitigate and minimize vulnerabilities, including all those on OWASP Top 10 Threats list. With the HighSecurity OWASP Set, you can start protecting your web applications right away with a low false-positive rate and a higher defense capability.
    4.8

    Overview

    This product is for new AWS WAF. Cyber Security Cloud Managed Rules provide rulesets that are regularly updated to include the latest threat alerts by using Cyber Threat Intelligence. These rulesets are designed to mitigate and minimize vulnerabilities, including all those on OWASP Top 10 Web Application Threats list. By using our rulesets, you can satisfy the security requirements for web applications in order to comply with security standards such as PCI-DSS. Included are a lot of managed rules targeting common vulnerabilities such as code injection techniques (SQLi, NoSQLi, OScommandi, etc), XSS, directory traversal and known exploits involving web-applications using technologies such as Apache Struts2/ Apache Tomcat/ Oracle WebLogic/ WordPress/ Drupal/ Joomla! and Malicious Bots rulesets.

    Cyber Security Cloud Managed Rules are designed to mitigate and minimize vulnerabilities, including all those on OWASP Top 10 Web Application Threats list. With the HighSecurity OWASP Set, you can start protecting your web applications right away with a low false-positive rate and a higher defense capability.

    Want to add enhanced automation to these rules? Learn about our add-on products belows:

    Highlights

    • Can build a more secure environment immediately
    • Designed to have the defense capability needed to protect your web applications, with a low false-positive rate
    • Minimizes OWASP Top 10 Web Application threats

    Details

    Categories

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Cyber Security Cloud Managed Rules for AWS WAF -HighSecurity OWASP Set-

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (2)

     Info
    Dimension
    Cost/unit
    Charge per month in each available region (pro-rated by the hour)
    $25.00
    Charge per million requests in each available region
    $1.20

    Vendor refund policy

    Non-Refundable

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    For issues related specifically to Cyber Security Cloud Managed Rules, you can contact support offered by Cyber Security Cloud by email (We can respond in English or Japanese) https://www.wafcharm.com/en/managed-rules/support/ 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    2 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Threat Intelligence Integration
    Rulesets regularly updated with latest threat alerts using Cyber Threat Intelligence
    OWASP Top 10 Coverage
    Comprehensive protection against all OWASP Top 10 Web Application Threats
    Code Injection Prevention
    Managed rules targeting code injection techniques including SQLi, NoSQLi, and OS command injection
    Technology-Specific Vulnerability Protection
    Dedicated rules for known exploits in Apache Struts2, Apache Tomcat, Oracle WebLogic, WordPress, Drupal, and Joomla
    Malicious Bot Detection
    Malicious Bots rulesets included for bot-based threat mitigation
    OWASP Top 10 Protection Coverage
    Comprehensive ruleset protecting against all OWASP Top 10 web application threats including SQL Injection, Cross Site Scripting, General and Known Exploits, Malicious Bots, and Common Vulnerabilities and Exposures (CVE)
    Threat Intelligence Updates
    Regular updates from FortiGuard Labs to include latest threat information and security signatures
    Configurable Response Actions
    Rules can be configured to log, alert, and/or block detected threats
    FortiWeb Security Signatures
    Rulesets based on FortiWeb web application firewall security service signatures
    AWS WAF Integration
    Managed rule group compatible with AWS WAF for web application firewall deployment across multiple web ACLs and regions
    OWASP Top 10 Attack Protection
    Provides protection against web attacks including SQL injection, cross-site scripting (XSS), command injection, NoSQL injection, path traversal, and predictable resource exploitation.
    Managed Rule Updates
    Rules are written, managed and regularly updated by F5's security specialists to ensure protection against evolving threats without requiring manual intervention.
    AWS WAF Integration
    Rules can be attached to AWS WAF instances for immediate deployment and protection enhancement.
    Automated Threat Detection
    Utilizes security expertise to identify and mitigate vulnerabilities that are part of the OWASP Top 10 attack vectors.
    Pay-as-You-Go Licensing Model
    Rules are licensed on a consumption-based pricing structure where usage determines costs.

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.8
    2 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    100%
    0%
    0%
    0%
    0%
    2 AWS reviews
    Ronald Paz

    Layered defense has reduced web attacks and now improves zero trust visibility and response

    Reviewed on Feb 21, 2026
    Review from a verified AWS customer

    What is our primary use case?

    My main use case for Cyber Security Cloud Managed Rules  goes beyond simple blocking, as I leverage managed rules as part of my layered defense model with Zero Trust and defense in depth. The value is not only prevention but also telemetry generation.

    In one of my financial sector projects, I use Cyber Security Cloud Managed Rules  to protect public-facing web applications and APIs specifically. I deployed managed rule sets aligned with OWASP Top 10 to automatically detect and block SQL injection, XSS, and protocol anomalies at the edge layer.

    On a day-to-day basis, I review rule triggers with Cyber Security Cloud Managed Rules, fine-tune exclusions to reduce false positives, and correlate WAF  logs with SIEM  XDR  alerts to validate attack patterns. This allows me to implement preventive controls before threats reach the application layer.

    What is most valuable?

    The best features that Cyber Security Cloud Managed Rules offers in my experience include automatic rule updates maintained by the vendor.

    The automatic rule update feature impacts my work and my team's workflow positively, as the most measurable impacts have been a reduction in the application layer attack surface, a decrease in successful exploitation attempts, and faster mitigation of zero-day exposure of the web layer.

    Regarding the features, I would add that integration with centralized logging and XDR  SIEM  platform is also critical, but the automated threat intelligence updates provide the highest operational efficiency gain.

    Cyber Security Cloud Managed Rules has positively impacted my organization overall, as I observe approximately 60-70% reduction in manual WAF  rule management and 40% faster incident triage due to cleaner structured alerting.

    What needs improvement?

    There are areas for improvement regarding how those improvements affect my team's day-to-day work or my response times. Granular visibility into rule logic is sometimes lacking, as managed rules act as a black box, and false positive tuning complexity increases in complex IP environments.

    To address the issues I mentioned, such as granular visibility and complexity in certain environments, Cyber Security Cloud Managed Rules can be improved by providing deeper transparency and a DevOps/SecOps native capability, which would enhance value further.

    I would add that there is a need for a better contextual attack analytics dashboard for executive reporting.

    For how long have I used the solution?

    I have been using Cyber Security Cloud Managed Rules for six months.

    What do I think about the stability of the solution?

    Cyber Security Cloud Managed Rules is stable.

    What do I think about the scalability of the solution?

    The scalability of Cyber Security Cloud Managed Rules is one of its strongest attributes, as scaling is both elastic and automatic because it is cloud-native.

    How are customer service and support?

    The customer support for Cyber Security Cloud Managed Rules is good, and I do not have a problem with that.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I did not previously use a different solution.

    What was our ROI?

    I have seen a return on investment, and our ROI indicators include reduced downtime risk from web-based attacks, reduced manual security engineering hours, and improved compliance audit readiness. In metrics, I have blocked over 120,000 malicious requests per month and reduced manual WAF administration time by 50%.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup cost, and licensing shows that while pricing is generally consumption-based, for organizations with high traffic, costs can scale quickly. Setup costs are relatively low compared to traditional on-premise WAF. Overall, the pricing model aligns with cloud economics, but cost governance is important.

    Which other solutions did I evaluate?

    Before choosing Cyber Security Cloud Managed Rules, I did not evaluate other options.

    What other advice do I have?

    My advice for others looking into using Cyber Security Cloud Managed Rules is to not rely solely on default configuration but to perform continuous tuning. It is important to integrate logs into SIEM/XDR immediately and to monitor false positives carefully during the initial rollout.

    I rate Cyber Security Cloud Managed Rules overall as nine out of ten because of the proactive and preventive protection, operational efficiency, and scalability. However, limited transparency in some rule logic and occasional tuning complexity prevent it from being a perfect ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)
    Y.K

    The most detect vulnerability scans

    Reviewed on Apr 05, 2021
    Review from a verified AWS customer

    We tested how many detected attacks when select waf rules.
    We used vulnerability scanner to many rules, this rule detected the most attacks and few false positive.
    This rule covers basic attacks on web applications such as SQL Injection and XSS and can block a wide range of attacks.
    You can check which request was blocked by outputting the WAF log through Amazon Kinesis Data Firehose to see if there is a false positive and how much is blocked by which rule.
    We could reductioned noise request for our application.

    View all reviews