Copyright | (c) 2013-2023 Brendan Hay |
---|---|
License | Mozilla Public License, v. 2.0. |
Maintainer | Brendan Hay |
Stability | auto-generated |
Portability | non-portable (GHC extensions) |
Safe Haskell | Safe-Inferred |
Language | Haskell2010 |
Synopsis
- data SqliMatchStatement = SqliMatchStatement' {}
- newSqliMatchStatement :: FieldToMatch -> NonEmpty TextTransformation -> SqliMatchStatement
- sqliMatchStatement_sensitivityLevel :: Lens' SqliMatchStatement (Maybe SensitivityLevel)
- sqliMatchStatement_fieldToMatch :: Lens' SqliMatchStatement FieldToMatch
- sqliMatchStatement_textTransformations :: Lens' SqliMatchStatement (NonEmpty TextTransformation)
Documentation
data SqliMatchStatement Source #
A rule statement that inspects for malicious SQL code. Attackers insert malicious SQL code into web requests to do things like modify your database or extract data from it.
See: newSqliMatchStatement
smart constructor.
SqliMatchStatement' | |
|
Instances
newSqliMatchStatement Source #
Create a value of SqliMatchStatement
with all optional fields omitted.
Use generic-lens or optics to modify other optional fields.
The following record fields are available, with the corresponding lenses provided for backwards compatibility:
$sel:sensitivityLevel:SqliMatchStatement'
, sqliMatchStatement_sensitivityLevel
- The sensitivity that you want WAF to use to inspect for SQL injection
attacks.
HIGH
detects more attacks, but might generate more false positives,
especially if your web requests frequently contain unusual strings. For
information about identifying and mitigating false positives, see
Testing and tuning
in the WAF Developer Guide.
LOW
is generally a better choice for resources that already have other
protections against SQL injection attacks or that have a low tolerance
for false positives.
Default: LOW
$sel:fieldToMatch:SqliMatchStatement'
, sqliMatchStatement_fieldToMatch
- The part of the web request that you want WAF to inspect.
$sel:textTransformations:SqliMatchStatement'
, sqliMatchStatement_textTransformations
- Text transformations eliminate some of the unusual formatting that
attackers use in web requests in an effort to bypass detection. If you
specify one or more transformations in a rule statement, WAF performs
all transformations on the content of the request component identified
by FieldToMatch
, starting from the lowest priority setting, before
inspecting the content for a match.
sqliMatchStatement_sensitivityLevel :: Lens' SqliMatchStatement (Maybe SensitivityLevel) Source #
The sensitivity that you want WAF to use to inspect for SQL injection attacks.
HIGH
detects more attacks, but might generate more false positives,
especially if your web requests frequently contain unusual strings. For
information about identifying and mitigating false positives, see
Testing and tuning
in the WAF Developer Guide.
LOW
is generally a better choice for resources that already have other
protections against SQL injection attacks or that have a low tolerance
for false positives.
Default: LOW
sqliMatchStatement_fieldToMatch :: Lens' SqliMatchStatement FieldToMatch Source #
The part of the web request that you want WAF to inspect.
sqliMatchStatement_textTransformations :: Lens' SqliMatchStatement (NonEmpty TextTransformation) Source #
Text transformations eliminate some of the unusual formatting that
attackers use in web requests in an effort to bypass detection. If you
specify one or more transformations in a rule statement, WAF performs
all transformations on the content of the request component identified
by FieldToMatch
, starting from the lowest priority setting, before
inspecting the content for a match.