← All posts

Detect and block advanced bot traffic with AWS WAF

I published a post on the AWS Security Blog covering the newly launched AWS WAF Bot Control for Targeted Bots.

Targeted bots are the hard problem — they mimic human behaviour, rotate IPs, and bypass simple rate limits. The new targeted inspection level uses browser fingerprinting and client-side JavaScript interrogation to catch them, without requiring any changes to your application or architecture.

The post walks through:

  • The difference between common and targeted bot inspection levels
  • Configuring per-category actions — block, challenge, CAPTCHA, count, allow
  • Scope-down statements to limit Bot Control to the URIs that actually need it (login, checkout) and keep costs sane
  • Token domains — a single web ACL accepting WAF tokens across multiple domains and CloudFront distributions
  • Embedding the JavaScript Application Integration SDK so WAF can reject tokenless requests outright
  • Rule ordering and CloudWatch alarm setup for token-absent spikes

Read the full post on the AWS Security Blog

Etienne Munnich
Etienne Munnich
Let's make the internet fun again.

Sr. Edge SA at AWS, based in Sydney. I write about web application security, CloudFront, WAF, serverless, and whatever else I find interesting enough to sit down and type about.

Views and opinions are my own and do not represent those of AWS.