We are using it to monitor the requests on our site, to block sudden surges of users on our website, and also to prevent DDoS attacks.
Junior Associate - IT at a tech services company with 201-500 employees
Can block sudden surges of users on the website and provides protection against DDoS attacks
Pros and Cons
- "The most valuable feature is the addition of managed tools that help us create customizable rules. In case we want to block a particular request, we can make use of those rules."
- "One area that could be improved is the DDoS protection."
What is our primary use case?
What is most valuable?
The addition of managed tools that help us create customizable rules. In case we want to block a particular request, we can make use of those rules.
What needs improvement?
One area that could be improved is the DDoS protection. We had a DDoS attack recently, and even though we had set a limit of 1,000 requests per five minutes, AWS WAF was not able to block all of the requests.
AWS wasn't able to clarify all the DDoS attacks. It may have been due to a wrong configuration in the rules, but AWS didn't block all the requests.
For how long have I used the solution?
It's been deployed in a project for one year.
Buyer's Guide
AWS WAF
February 2026
Learn what your peers think about AWS WAF. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
881,757 professionals have used our research since 2012.
What do I think about the stability of the solution?
I would rate the stability a ten out of ten. It is a very stable solution. There are over 16 end users using the solution.
What do I think about the scalability of the solution?
I would rate the scalability a nine out of ten. There is room for improvement.
How was the initial setup?
The initial setup is easy. You don't need to do too many things.
What about the implementation team?
The deployment was done manually on the console, there is no need of propriety. It took around an hour and half.
What's my experience with pricing, setup cost, and licensing?
The pricing totally depends on the number of requests entering the WAF. For example, in case we have a DDoS type of attack, at that time, the price will surge quickly. For example, it will go up to two hundred dollars within three to four days. So it totally depends on the number of requests it is processing.
There are additional costs to the standard license because it totally depends on the number of incoming requests.
What other advice do I have?
Overall, I would rate the solution an eight out of ten.
I would recommend that understanding how the rules work exactly and finding patterns based on those rules is the most important thing in AWS WAF. It's quite easy to deploy at first, but afterward, it's essential to know how to handle it properly. Enabling the managed tools of AWS can sometimes block legitimate requests too. So, it's important to understand the type of requests you want to allow and how to configure the rules accordingly. It's quite an interesting aspect of AWS WAF.
Disclosure: My company has a business relationship with this vendor other than being a customer.
DevOps Engineer at a computer software company with 11-50 employees
It is user-friendly and has documentation on how to use it; it is stable and has a simple setup
Pros and Cons
- "What I like best about AWS WAF is that it's a simple tool, so I could understand the basics of AWS WAF in two to three hours."
- "AWS WAF would be better if it uses AI or machine learning to detect a potential attack or a potential IP that creates an attack even before it happens. I want AWS WAF to capture the IP and automatically write the rule to automate the entire process."
What is our primary use case?
We faced many potential threats, such as hackers flooding in the requests, so we started using AWS WAF to block those IPs and stop those attacks. If multiple IPs are trying to attack our product, we'll also use AWS WAF by selecting the endpoints the hackers were attacking and then blocking those endpoints. Our cybersecurity team primarily uses AWS WAF.
What is most valuable?
What I like best about AWS WAF is that it's a simple tool, so I could understand the basics of AWS WAF in two to three hours. From the start, I know its purpose and its use case.
AWS WAF also has documentation. It's a user-friendly tool, and it's easy to know how to block the IPs and endpoints.
What needs improvement?
AWS WAF would be better if it uses AI or machine learning to detect a potential attack or a potential IP that creates an attack even before it happens. I want AWS WAF to capture the IP and automatically write the rule to automate the entire process. I want an AI feature in AWS WAF in the future.
For how long have I used the solution?
I only saw how AWS WAF works for seven months when the cybersecurity team used it, so my knowledge of the tool is basic. I'm not an expert on AWS WAF.
What do I think about the stability of the solution?
AWS WAF is a stable product.
How are customer service and support?
I have yet to contact the AWS WAF technical support.
Which solution did I use previously and why did I switch?
As the company is an Amazon customer, the company looked into what other Amazon services could prevent the attack and came across AWS WAF when the attack happened. The tool was also easy to use and could prevent attacks and safeguard the company's product, so the company decided to use AWS WAF.
How was the initial setup?
The initial setup for AWS WAF was simple. It was a basic setup process, though I have no idea about deployment time.
What's my experience with pricing, setup cost, and licensing?
AWS WAF costs $5 monthly plus $1 for the rule. It's cheap, cost-wise. It's worth the money.
What other advice do I have?
AWS WAF has three users within the company.
If I were to advise you on using AWS WAF, I'd tell you first to understand how the attack is happening. For example, is it a single server attack or multiple servers or regions? It would be best to find out which target is being attacked. You need to know the basics before using AWS WAF. You also need to know the rules. You need to understand how to secure your endpoints. Users should have a basic understanding of AWS WAF and its purposes before using it. You need basic cybersecurity knowledge.
I'm new to cybersecurity, so AWS WAF is the first cybersecurity product I used and based on my experience and usage, it's a ten out of ten. AWS WAF is a user-friendly, on-point tool, and I could understand it easily.
My company is an Amazon customer.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
AWS WAF
February 2026
Learn what your peers think about AWS WAF. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
881,757 professionals have used our research since 2012.
Cloud Security Manager at a computer software company with 501-1,000 employees
Helps to secure applications and has good support, but needs more automation and easier deployment
Pros and Cons
- "AWS WAF is something that someone from a cloud background or cloud security background leverages. If they want to natively use a solution in the cloud, AWS WAF comes in handy. It's very useful for that, and the way we can fine-tune the WAF rules is also nice."
- "An improvement area would be that it's more of a manual effort when you have to enable rules. That's one of the downsides. If that can be done in an automated way, it would be great. That's a lagging feature currently."
What is our primary use case?
It's more of an application security tool that we use to secure applications.
What is most valuable?
AWS WAF is something that someone from a cloud background or cloud security background leverages. If they want to natively use a solution in the cloud, AWS WAF comes in handy. It's very useful for that, and the way we can fine-tune the WAF rules is also nice.
What needs improvement?
It's pretty much an AWS native service, so it's something that they improve year after year. They do continuous improvements on a year-by-year basis, so the product is really good. An improvement area would be that it's more of a manual effort when you have to enable rules. That's one of the downsides. If that can be done in an automated way, it would be great. That's a lagging feature currently.
It could also support multi-cloud integration where you can integrate with applications other than AWS applications. It would be a good feature or use case for this solution.
For how long have I used the solution?
I've been using this solution for almost three to four years.
What do I think about the stability of the solution?
It's stable. I'd rate it an eight out of ten in terms of stability.
What do I think about the scalability of the solution?
It's scalable. We probably have more than a hundred users. It's pretty much being used by everyone, such as engineers, managers, etc. Everyone is into it.
How are customer service and support?
We get good support. I'd rate them a nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We didn't use any similar solution previously. In the future, we might use another solution, but for now, we are more into AWS WAF.
How was the initial setup?
It's neither complex nor simple. It's somewhere in the middle. I'd rate it a six out of ten in terms of the ease of the setup.
It's a cloud solution, and we have a multi-cloud scenario. We are pretty much using all four clouds: Amazon, Azure, AWS, and Oracle. It's a mix-and-match or hybrid.
In terms of maintenance, there would be a team of engineers to maintain it.
What's my experience with pricing, setup cost, and licensing?
Its price is fair. There is a very fair amount that they charge.
It has a pay-as-you-go model, so it pretty much depends on how much a user uses it. As per the cloud norms, the more you use, the more you pay. I would rate it a five out of ten in terms of pricing.
What other advice do I have?
Overall, I'd rate it a seven out of ten because it's not automated and it's a bit complicated to implement or deploy the solution.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Analyst at a financial services firm with 201-500 employees
A user-friendly web application firewall with a useful integration feature, but it could be more flexible
Pros and Cons
- "I believe the most impressive features are integration and ease of use. The best part of AWS WAF is the cloud-native WAF integration. There aren't any hidden deployments or hidden infrastructure which we have to maintain to have AWS WAF. AWS maintains everything; all we have to do is click the button, and WAF will be activated. Any packet coming through the internet will be filtered through."
- "It would be better if AWS WAF were more flexible. For example, if you take a third-party WAF like Imperva, they maintain the rule set, and these rule sets are constantly updated. They push security insights or new rules into the firewall. However, when it comes to AWS, it has a standard set of rules, and only those sets of rules in the application firewalls trigger alerts, block, and manage traffic. Alternative WAFs have something like bot mitigation or bot control within the WAF, but you don't have such things in AWS WAF. I will say there could have been better bot mitigation plans, there could have been better dealer mitigation plans, and there could be better-updated rule sets for every security issue which arises in web applications. In the next release, I would like to see if AWS WAF could take on DDoS protection within itself rather than being in a stand-alone solution like AWS Shield. I would also like a solution like a bot mitigation."
What is our primary use case?
We partner with many banks in India, and many partners use our portals to access their credit card or debit card information. So we use AWS WAF to protect our web application servers, app servers, and API servers from any malicious attacks which arise from the public internet. We also use AWS WAF for virtual patching of our servers to prevent any malicious requests from reaching the gateway to our internal systems.
What is most valuable?
I believe the most impressive features are integration and ease of use. The best part of AWS WAF is the cloud-native WAF integration. There aren't any hidden deployments or hidden infrastructure which we have to maintain to have AWS WAF. AWS maintains everything; all we have to do is click the button, and WAF will be activated. Any packet coming through the internet will be filtered through.
What needs improvement?
It would be better if AWS WAF were more flexible. For example, if you take a third-party WAF like Imperva, they maintain the rule set, and these rule sets are constantly updated. They push security insights or new rules into the firewall. However, when it comes to AWS, it has a standard set of rules, and only those sets of rules in the application firewalls trigger alerts, block, and manage traffic.
Alternative WAFs have something like bot mitigation or bot control within the WAF, but you don't have such things in AWS WAF. I will say there could have been better bot mitigation plans, there could have been better dealer mitigation plans, and there could be better-updated rule sets for every security issue which arises in web applications.
In the next release, I would like to see if AWS WAF could take on DDoS protection within itself rather than being in a stand-alone solution like AWS Shield. I would also like a solution like a bot mitigation.
For how long have I used the solution?
I have been using AWS WAF for a couple of years.
What do I think about the stability of the solution?
We haven't faced any issues over the past couple of years, so I believe AWS WAF is a stable product.
What do I think about the scalability of the solution?
Since we are AWS-native, it's very scalable. It can handle almost any infrastructure running within the AWS public cloud. We have around 20 portals, and about 20 products usually use AWS WAF. I'll say that about 15 people use AWS WAF to manage the traffic and filter out security issues. Those people are security analysts, SOC analysts, and layer 1 network analysts.
How are customer service and support?
In our business use case, sometimes it has triggered a false positive where it blocks some of our legitimate traffic. So we contact support to ask if this is legitimate and if we have to implement a new rule or if we have to allow such traffic and not mark it as a false positive. We have contacted them only for such occasions, and their support was really good.
On a scale from one to five, I would give technical support a four.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup was very simple. It's just a click of a button.
What about the implementation team?
We already have web applications running on an AWS account, so it probably took about two minutes to implement this solution.
What's my experience with pricing, setup cost, and licensing?
For our infrastructure, we probably pay around $16,000 per month for AWS WAF. Because alternative WAF solutions provide even more features, I think the AWS WAF is a bit pricey
What other advice do I have?
I would say that I think it's easy to use, easy to deploy, and has all the basic WAF features. It has no advanced features like bot mitigation or DDoS protection built-in. If it had bot mitigation or advanced security filter patching features, I would probably give it a higher rating, like a nine.
On a scale from one to ten, I would give AWS WAF a seven.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Raiffeisen at a financial services firm with 5,001-10,000 employees
Easy to deploy, implement, and manage
Pros and Cons
- "The agility is great for us in terms of cloud services in general."
- "For uniformity, AWS has a well-accepted framework. However, it'll be better for us if we could have some more documented guidelines on how the specific business should be structured and the roles that the cloud recommends."
What is our primary use case?
We primarily use the solution for load balancing.
We have some microsites exposed through the AWS cloud. These are some sort of pilot and we are using WAF to learn how this new product fits with us, and are mostly in the testing phase with a limited impact application. We are obviously not migrating core applications or those which have a significant impact on availability or on integrity and confidentiality. Mostly we have it on microsites where we don't see a significant risk, and it is more of a learning exercise for us.
What is most valuable?
The most important aspect for us is that AWS WAF is easy to deploy. The ease of implementation, ease of management, and flexibility are great. We like the potential for pay as you grow as you have instant deployment, infrastructure as a code, or any other automation tools that can leverage these deployments. The most important thing for us is that it stays flexible and scalable. That is true not only with WAF but with all the cloud services where you can provision any product in minutes.
With the cloud, you have these integrated tools that provide a single glass pane.
You have automation, ease of export, or ease of seeing the logs and exporting to a SIEM; these aspects are also great. The agility is great for us in terms of cloud services in general.
Usually, if we're talking about standard WAF, this is easy to deploy and is good at protecting low to medium applications.
What needs improvement?
As of now, regarding WAF, I'm not sure what the minuses or pluses are. You have the native WAF, which you can deploy directly on the load balancer. However, you also have that store where you can actually deploy some other vendors' specifics. At this point, feature-wise, I don't see anything lacking, more or less. Obviously, if we want to migrate, which is not yet the case, there might be a significant impact.
For uniformity, AWS has a well-accepted framework. However, it'll be better for us if we could have some more documented guidelines on how the specific business should be structured and the roles that the cloud recommends. If every company is building its own framework based on their experience or their past experience, this might be subjective, and it'll end up with each company having its own framework, which can be good. However, it'll be better to have a standardized baseline that every company could build on.
For how long have I used the solution?
We've been using the solution for more than a year at this point.
What do I think about the stability of the solution?
You have multiple availability zones and regions. The availability or durability is not something that we need to concern ourselves with very much here. Regarding the availability, I don't think this is something that the average company could match. They have a lot of availability zones, redundancy, and all the other things like that.
What do I think about the scalability of the solution?
It's scalable. Mostly, what I would look into is having cloud resiliency in the sense that we want multiple vendors, so if something happens with AWS, you'll need some sort of strategy and you'll need some other vendor to provide you with similar services.
We have a number of users per application. It's hard to quantify how many users are on the solution in general.
How are customer service and support?
For us, it's a bit of a different model where we have services provided by one central team or central entity. The others will have some sort of hub and spoke with the central entity providing or re-providing services to the other network units. The relationship with AWS is maintained by our central unit, and we somehow take services from the central unit and customize them per our needs. However, if we have some issues, this will be raised by the group. Issues may be resolved by AWS or an SME that works with us.
How was the initial setup?
In terms of the initial setup, from what I heard, it initially being a new technology, you want to deploy it in a correct manner. Therefore, it will need more diligence in the first deployment as security is not something you can learn and adjust. You need to make it right from day one in order to avoid breaches. However, after that, with infrastructure as a code and the automatic deployment, it's easier. You just create your setup, and you use the rules and go. You have network access to a security group, which provides you with very general filtering for problematic traffic.
From my experience, the cloud provides everything we need; however, we still lack the knowledge and framework in terms of who is doing what, et cetera.
It's quite different between on-premise and cloud. In the cloud, DevOps is doing a lot of things. On-premise, you have someone from infrastructure, someone installing the OS, and someone doing the vulnerability and patch management.
Depending on how you deploy, the activities need to be revised. You need to have this framework to work in the cloud, and it's more of a challenge in company philosophy rather than technical capabilities. Companies can find it challenging to migrate to new tools. Sometimes existing teams need to be re-educated.
We have multiple applications, so usually, it takes a while to refine the framework with the responsibility inside the company. It's to be optimized. However, in terms of actual deployment, security-wise, it takes some time to do the security checks, including the scanning and vulnerability asset inventory. It might take two or three months per application.
What other advice do I have?
I definitely recommend not only AWS. I also recommend Azure as an option. We have the integration with Office and the entire portfolio. The cloud, in general, it's a new thing to consider. For example, you have this GDPR with data in Europe. However, in the case of most of the clouds, you can select your regions and you have some control.
I'd rate the solution nine out of ten.
There are a huge amount of products. I'm not saying it's a bad or a good thing. However, it can be quite confusing. There are VPC, EC2, and other instances, and there are a lot of other services that you can use like Macie, where you can filter sensitive information. There are a lot of tools that require hands-on and new capabilities. For me, being at the beginning of this journey for cloud migration, I've been mostly quite happy with the results.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Administrator at a media company with 51-200 employees
Advanced security with effective OWASP filtering rules and easy connectivity
Pros and Cons
- "They filter a lot of attacks out."
- "Rule exclusion could be a bit more transparent."
What is our primary use case?
The primary use case for AWS WAF involves securing applications for our customers, who are mainly software developers. Their application is positioned behind the firewall.
How has it helped my organization?
DDoS attacks are being blocked by AWS WAF, which is something some of my customers really need as they are targeted quite often.
What is most valuable?
The most valuable feature of AWS WAF is the OWASP filtering rules. They filter a lot of attacks out. Moreover, the service includes DDoS protection.
What needs improvement?
Rule exclusion could be a bit more transparent. However, it works great overall.
For how long have I used the solution?
I have been working with AWS WAF for two years now.
What do I think about the stability of the solution?
AWS WAF is stable. I have no complaints regarding its stability.
What do I think about the scalability of the solution?
It is easy to scale up AWS WAF. I would rate it an eight out of ten on the scale of scalability.
How are customer service and support?
I have never needed customer support for AWS WAF.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
The old team I worked at is still using Enable Insight remote monitoring, but personally, I am now using Datadog.
How was the initial setup?
AWS WAF is easy to connect, and I would rate the overall setup process as a seven since it's still a lot of work.
What about the implementation team?
I manage the AWS WAF for my clients and am responsible for the implementation.
What was our ROI?
The return on investment is difficult to determine. When a successful hack attempt is stopped, the investment is already returned.
What's my experience with pricing, setup cost, and licensing?
The customers think AWS WAF is expensive. Compared to hardware solutions, it is slightly more expensive, but it includes extra services. Personally, I find it fairly priced.
Which other solutions did I evaluate?
I did not explicitly evaluate any alternate solutions for AWS WAF.
What other advice do I have?
If security is an issue and you want to be secure, you should use AWS WAF.
I'd rate the solution eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer.
A highly stable product that provides a good interface and is easy to configure
Pros and Cons
- "The interface is good."
- "The price could be improved."
What is our primary use case?
We use the solution to secure our public web server and run our document management process. We have service-oriented web servers and interactive web servers.
What is most valuable?
Custom rules are valuable to us. We have country-specific rules that we apply. The solution meets all our requirements. We never had a problem with the tool. The interface is good. We never had downtime. The solution does its job.
What needs improvement?
The price could be improved.
For how long have I used the solution?
I have been using the solution for more than two years.
What do I think about the stability of the solution?
The tool is highly stable.
What do I think about the scalability of the solution?
The tool is highly scalable. Almost all AWS products are highly scalable. I am the only user in my organization. The solution is running regularly. We check the logs whenever we have some issues. We do not include it in our security management system. It's a very small application. We use it to manage some documents.
How was the initial setup?
The initial setup is easy. The deployment took an hour. The setup and maintenance is easy. We do not face any issues with configuration.
What about the implementation team?
We deployed the solution in-house.
What's my experience with pricing, setup cost, and licensing?
The solution is reasonably priced.
What other advice do I have?
We never had DDoS attacks. We do not check logs deeply. The service is a very small portion of our application server. It is not a business-critical service. We check logs only when we have any performance or connectivity issues. Overall, I rate the product a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security implmentation engineer at a security firm with 51-200 employees
The product is highly scalable and has a helpful support team, but it should improve the features that mitigate DDoS attacks
Pros and Cons
- "We do not have to maintain the solution."
- "The product should improve the DDoS-related features."
What is our primary use case?
We use the solution for publishing important applications. These sites are accessed by hundred to one million users every day.
What is most valuable?
We do not have to maintain the solution. Amazon maintains the product.
What needs improvement?
We have a lot of issues related to attacks on our cloud. There is a limitation on how to mitigate the issues in the solution. The product should improve the DDoS-related features.
The solution should provide an advanced tool for DDoS migration and a better reporting method. Compared to other solutions, we do not get all the information we need for reporting.
For how long have I used the solution?
I am dealing with the solution right now.
What do I think about the stability of the solution?
The solution is stable. It does not depend on the data centre or browser consumption.
What do I think about the scalability of the solution?
The product has high scalability. I can increase the resources without any effort.
How are customer service and support?
The support team is very helpful.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is too simple on the AWS. It is not complex at all. If we take certain courses and view a lot of videos on how to implement the solution, it is very easy. Support helps us with the deployment.
What about the implementation team?
Our teams do not manage the product. The deployment process includes adding a new customer, reserving their information on the cloud, creating the nodes, publishing the service and testing it on the old security aspects. Then, the solution is deployed on the cloud.
The time taken for deployment depends on the customer's requirements. Usually, there is a delay due to missing information from the customers. One or two engineers can handle the deployment. We do not need a big team for it.
What other advice do I have?
We have decided to use Cloudflare to integrate with AWS, and most of our issues have been resolved. I would recommend the solution. However, it depends on the customer’s data confidentiality. If there are confidential data on the servers, they should not be on the cloud. They can use the cloud solution if the data is normal and not critical. Overall, I rate the product a seven out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
Buyer's Guide
Download our free AWS WAF Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2026
Product Categories
Web Application Firewall (WAF)Popular Comparisons
Prisma Cloud by Palo Alto Networks
Imperva Application Security Platform
Fortinet FortiWeb
Azure Front Door
Microsoft Azure Application Gateway
F5 Advanced WAF
NetScaler
Cloudflare Web Application Firewall
Akamai App and API Protector
F5 Distributed Cloud Services
Azure Web Application Firewall
Radware Alteon
Fastly
Check Point CloudGuard WAF
NGINX App Protect
Buyer's Guide
Download our free AWS WAF Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the limitations of AWS WAF vs alternative WAFs?
- Can you share your experience on migration from Akamai Kona Site to Amazon CloudFront and AWS WAF?
- How does AWS WAF compare to Microsoft Azure Application Gateway?
- Which lesser known firewall product has the best chance at unseating the market leaders?
- Which WAF solution would you recommend to cater to 100 to 125 concurrent sessions?
- What do you recommend for a securing Web Application?
- Fortinet vs Sophos? Help choose a NGFW solution that can replace Microsoft TMG.
- Imperva WAF vs. Barracuda: Which One is Better?
- F5 vs. Imperva WAF?
- When should companies use SSL Inspection?


















