amazonka-wafv2-2.0: Amazon WAFV2 SDK.
Copyright(c) 2013-2023 Brendan Hay
LicenseMozilla Public License, v. 2.0.
MaintainerBrendan Hay
Stabilityauto-generated
Portabilitynon-portable (GHC extensions)
Safe HaskellSafe-Inferred
LanguageHaskell2010

Amazonka.WAFV2.Types.SqliMatchStatement

Description

 
Synopsis

Documentation

data SqliMatchStatement Source #

A rule statement that inspects for malicious SQL code. Attackers insert malicious SQL code into web requests to do things like modify your database or extract data from it.

See: newSqliMatchStatement smart constructor.

Constructors

SqliMatchStatement' 

Fields

  • sensitivityLevel :: Maybe SensitivityLevel

    The sensitivity that you want WAF to use to inspect for SQL injection attacks.

    HIGH detects more attacks, but might generate more false positives, especially if your web requests frequently contain unusual strings. For information about identifying and mitigating false positives, see Testing and tuning in the WAF Developer Guide.

    LOW is generally a better choice for resources that already have other protections against SQL injection attacks or that have a low tolerance for false positives.

    Default: LOW

  • fieldToMatch :: FieldToMatch

    The part of the web request that you want WAF to inspect.

  • textTransformations :: NonEmpty TextTransformation

    Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass detection. If you specify one or more transformations in a rule statement, WAF performs all transformations on the content of the request component identified by FieldToMatch, starting from the lowest priority setting, before inspecting the content for a match.

Instances

Instances details
FromJSON SqliMatchStatement Source # 
Instance details

Defined in Amazonka.WAFV2.Types.SqliMatchStatement

ToJSON SqliMatchStatement Source # 
Instance details

Defined in Amazonka.WAFV2.Types.SqliMatchStatement

Generic SqliMatchStatement Source # 
Instance details

Defined in Amazonka.WAFV2.Types.SqliMatchStatement

Associated Types

type Rep SqliMatchStatement :: Type -> Type #

Read SqliMatchStatement Source # 
Instance details

Defined in Amazonka.WAFV2.Types.SqliMatchStatement

Show SqliMatchStatement Source # 
Instance details

Defined in Amazonka.WAFV2.Types.SqliMatchStatement

NFData SqliMatchStatement Source # 
Instance details

Defined in Amazonka.WAFV2.Types.SqliMatchStatement

Methods

rnf :: SqliMatchStatement -> () #

Eq SqliMatchStatement Source # 
Instance details

Defined in Amazonka.WAFV2.Types.SqliMatchStatement

Hashable SqliMatchStatement Source # 
Instance details

Defined in Amazonka.WAFV2.Types.SqliMatchStatement

type Rep SqliMatchStatement Source # 
Instance details

Defined in Amazonka.WAFV2.Types.SqliMatchStatement

type Rep SqliMatchStatement = D1 ('MetaData "SqliMatchStatement" "Amazonka.WAFV2.Types.SqliMatchStatement" "amazonka-wafv2-2.0-3v3WgpYn7RT5hSd6MsT5dN" 'False) (C1 ('MetaCons "SqliMatchStatement'" 'PrefixI 'True) (S1 ('MetaSel ('Just "sensitivityLevel") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe SensitivityLevel)) :*: (S1 ('MetaSel ('Just "fieldToMatch") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 FieldToMatch) :*: S1 ('MetaSel ('Just "textTransformations") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (NonEmpty TextTransformation)))))

newSqliMatchStatement Source #

Create a value of SqliMatchStatement with all optional fields omitted.

Use generic-lens or optics to modify other optional fields.

The following record fields are available, with the corresponding lenses provided for backwards compatibility:

$sel:sensitivityLevel:SqliMatchStatement', sqliMatchStatement_sensitivityLevel - The sensitivity that you want WAF to use to inspect for SQL injection attacks.

HIGH detects more attacks, but might generate more false positives, especially if your web requests frequently contain unusual strings. For information about identifying and mitigating false positives, see Testing and tuning in the WAF Developer Guide.

LOW is generally a better choice for resources that already have other protections against SQL injection attacks or that have a low tolerance for false positives.

Default: LOW

$sel:fieldToMatch:SqliMatchStatement', sqliMatchStatement_fieldToMatch - The part of the web request that you want WAF to inspect.

$sel:textTransformations:SqliMatchStatement', sqliMatchStatement_textTransformations - Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass detection. If you specify one or more transformations in a rule statement, WAF performs all transformations on the content of the request component identified by FieldToMatch, starting from the lowest priority setting, before inspecting the content for a match.

sqliMatchStatement_sensitivityLevel :: Lens' SqliMatchStatement (Maybe SensitivityLevel) Source #

The sensitivity that you want WAF to use to inspect for SQL injection attacks.

HIGH detects more attacks, but might generate more false positives, especially if your web requests frequently contain unusual strings. For information about identifying and mitigating false positives, see Testing and tuning in the WAF Developer Guide.

LOW is generally a better choice for resources that already have other protections against SQL injection attacks or that have a low tolerance for false positives.

Default: LOW

sqliMatchStatement_fieldToMatch :: Lens' SqliMatchStatement FieldToMatch Source #

The part of the web request that you want WAF to inspect.

sqliMatchStatement_textTransformations :: Lens' SqliMatchStatement (NonEmpty TextTransformation) Source #

Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass detection. If you specify one or more transformations in a rule statement, WAF performs all transformations on the content of the request component identified by FieldToMatch, starting from the lowest priority setting, before inspecting the content for a match.