Retrieves an array of managed rule groups that are available for you to use. This list includes all AWS Managed Rules rule groups and the AWS Marketplace managed rule groups that you’re subscribed to.
See also: AWS API Documentation
See ‘aws help’ for descriptions of global parameters.
list-available-managed-rule-groups
--scope <value>
[--next-marker <value>]
[--limit <value>]
[--cli-input-json | --cli-input-yaml]
[--generate-cli-skeleton <value>]
--scope
(string)
Specifies whether this is for an AWS CloudFront distribution or for a regional application. A regional application can be an Application Load Balancer (ALB), an API Gateway REST API, or an AppSync GraphQL API.
To work with CloudFront, you must also specify the Region US East (N. Virginia) as follows:
CLI - Specify the Region when you use the CloudFront scope:
--scope=CLOUDFRONT --region=us-east-1
.API and SDKs - For all calls, use the Region endpoint us-east-1.
Possible values:
CLOUDFRONT
REGIONAL
--next-marker
(string)
When you request a list of objects with a
Limit
setting, if the number of objects that are still available for retrieval exceeds the limit, AWS WAF returns aNextMarker
value in the response. To retrieve the next batch of objects, provide the marker from the prior call in your next request.
--limit
(integer)
The maximum number of objects that you want AWS WAF to return for this request. If more objects are available, in the response, AWS WAF provides a
NextMarker
value that you can use in a subsequent call to get the next batch of objects.
--cli-input-json
| --cli-input-yaml
(string)
Reads arguments from the JSON string provided. The JSON string follows the format provided by --generate-cli-skeleton
. If other arguments are provided on the command line, those values will override the JSON-provided values. It is not possible to pass arbitrary binary values using a JSON-provided value as the string will be taken literally. This may not be specified along with --cli-input-yaml
.
--generate-cli-skeleton
(string)
Prints a JSON skeleton to standard output without sending an API request. If provided with no value or the value input
, prints a sample input JSON that can be used as an argument for --cli-input-json
. Similarly, if provided yaml-input
it will print a sample input YAML that can be used with --cli-input-yaml
. If provided with the value output
, it validates the command inputs and returns a sample output JSON for that command.
See ‘aws help’ for descriptions of global parameters.
To retrieve the managed rule groups
The following list-available-managed-rule-groups
returns the list of all managed rule groups that are currently available for use in your web ACLs.
aws wafv2 list-available-managed-rule-groups \
--scope REGIONAL
Output:
{
"ManagedRuleGroups": [
{
"VendorName": "AWS",
"Name": "AWSManagedRulesCommonRuleSet",
"Description": "Contains rules that are generally applicable to web applications. This provides protection against exploitation of a wide range of vulnerabilities, including those described in OWASP publications and common Common Vulnerabilities and Exposures (CVE)."
},
{
"VendorName": "AWS",
"Name": "AWSManagedRulesAdminProtectionRuleSet",
"Description": "Contains rules that allow you to block external access to exposed admin pages. This may be useful if you are running third-party software or would like to reduce the risk of a malicious actor gaining administrative access to your application."
},
{
"VendorName": "AWS",
"Name": "AWSManagedRulesKnownBadInputsRuleSet",
"Description": "Contains rules that allow you to block request patterns that are known to be invalid and are associated with exploitation or discovery of vulnerabilities. This can help reduce the risk of a malicious actor discovering a vulnerable application."
},
{
"VendorName": "AWS",
"Name": "AWSManagedRulesSQLiRuleSet",
"Description": "Contains rules that allow you to block request patterns associated with exploitation of SQL databases, like SQL injection attacks. This can help prevent remote injection of unauthorized queries."
},
{
"VendorName": "AWS",
"Name": "AWSManagedRulesLinuxRuleSet",
"Description": "Contains rules that block request patterns associated with exploitation of vulnerabilities specific to Linux, including LFI attacks. This can help prevent attacks that expose file contents or execute code for which the attacker should not have had access."
},
{
"VendorName": "AWS",
"Name": "AWSManagedRulesUnixRuleSet",
"Description": "Contains rules that block request patterns associated with exploiting vulnerabilities specific to POSIX/POSIX-like OS, including LFI attacks. This can help prevent attacks that expose file contents or execute code for which access should not been allowed."
},
{
"VendorName": "AWS",
"Name": "AWSManagedRulesWindowsRuleSet",
"Description": "Contains rules that block request patterns associated with exploiting vulnerabilities specific to Windows, (e.g., PowerShell commands). This can help prevent exploits that allow attacker to run unauthorized commands or execute malicious code."
},
{
"VendorName": "AWS",
"Name": "AWSManagedRulesPHPRuleSet",
"Description": "Contains rules that block request patterns associated with exploiting vulnerabilities specific to the use of the PHP, including injection of unsafe PHP functions. This can help prevent exploits that allow an attacker to remotely execute code or commands."
},
{
"VendorName": "AWS",
"Name": "AWSManagedRulesWordPressRuleSet",
"Description": "The WordPress Applications group contains rules that block request patterns associated with the exploitation of vulnerabilities specific to WordPress sites."
},
{
"VendorName": "AWS",
"Name": "AWSManagedRulesAmazonIpReputationList",
"Description": "This group contains rules that are based on Amazon threat intelligence. This is useful if you would like to block sources associated with bots or other threats."
}
]
}
For more information, see Managed Rule Groups in the AWS WAF, AWS Firewall Manager, and AWS Shield Advanced Developer Guide.
NextMarker -> (string)
When you request a list of objects with a
Limit
setting, if the number of objects that are still available for retrieval exceeds the limit, AWS WAF returns aNextMarker
value in the response. To retrieve the next batch of objects, provide the marker from the prior call in your next request.
ManagedRuleGroups -> (list)
(structure)
High-level information about a managed rule group, returned by ListAvailableManagedRuleGroups . This provides information like the name and vendor name, that you provide when you add a ManagedRuleGroupStatement to a web ACL. Managed rule groups include AWS Managed Rules rule groups, which are free of charge to AWS WAF customers, and AWS Marketplace managed rule groups, which you can subscribe to through AWS Marketplace.
VendorName -> (string)
The name of the managed rule group vendor. You use this, along with the rule group name, to identify the rule group.
Name -> (string)
The name of the managed rule group. You use this, along with the vendor name, to identify the rule group.
Description -> (string)
The description of the managed rule group, provided by AWS Managed Rules or the AWS Marketplace seller who manages it.