What Security Requirements are Missing from your WAF? How to  Uncover Hidden Security Gaps

What is a WAF?

A Well-Architected Framework (WAF) is designed to help you build secure, high-performing, resilient, and efficient infrastructure in the cloud. My knowledge of the WAF is based on my experience with Amazon Web Services (AWS) and Microsoft Azure, so those will be the examples I use in this article.

What Is a “Pillar” in the Context of a Well-Architected Framework?

In cloud architecture, a pillar refers to a core focus area that supports the overall stability, efficiency, and effectiveness of a cloud workload. Each pillar represents a set of best practices and design principles that guide the development of secure, high-performing, resilient, and cost-effective solutions.

AWS WAF Pillars:

  • Operational Excellence – Monitor, manage, and improve continuously.
  • Security – Protect data, systems, and assets.
  • Reliability – Design for resiliency and recoverability.
  • Performance Efficiency – Ensure your workloads scale and perform well.
  • Cost Optimization – Maximize value and control spending.
  • Sustainability – Minimizing environmental cloud impact. 

Azure WAF Pillars:

  • Cost Optimization – Maximize value and control spending.
  • Operational Excellence – Monitor, manage, and improve continuously.
  • Performance Efficiency – Ensure your workloads scale and perform well.
  • Reliability – Design for resiliency and recoverability.
  • Security – Protect data, systems, and assets.

Now that we’ve explored what a Well-Architected Framework (WAF) is and broken down the Security Pillar across both AWS and Azure, let’s return to the key question: “What security requirements are missing from your WAF?” This isn’t a question you can answer off the cuff, it demands a thoughtful, layered approach. To get started, here are my two essential recommended steps that will guide you toward identifying what may be missing:

1) Start With the Industry You Serve

Security is never one-size-fits-all. The industry your application supports directly influences the specific security controls and compliance frameworks you need to implement. Here are two example industries:

Healthcare Application

If you’re building or managing a healthcare app, you’re likely dealing with Protected Health Information (PHI). That brings the Health Insurance Portability and Accountability Act (HIPAA) into the spotlight. HIPAA mandates strict controls around:

  • Access control (who can view what)
  • Audit logging and monitoring
  • Encryption at rest and in transit
  • Breach notification procedures
  • Data retention and secure disposal

You may also need Business Associate Agreements (BAAs) with your cloud provider and third parties. This ensures that any third-party company handling PHI on behalf of the customer is accountable for protecting it.

Educational Application

Educational apps, on the other hand, may handle Personally Identifiable Information (PII) of students, educators, and guardians. Compliance might include:

  • FERPA (Family Educational Rights and Privacy Act) in the U.S.
  • COPPA (Children’s Online Privacy Protection Act) if minors are involved
  • Role-based access for teachers, admins, and students
  • Parental consent mechanisms
  • Audit trails for student activity

While these apps may not handle medical data, they still require strict privacy controls and careful user data management.

2) Revisit the Definition of the Security Pillar

Regardless of industry, the Security Pillar in both AWS and Azure focuses on the same foundational principles: Protect your data, systems, and assets. Let’s break that down: 

Baseline Security Requirements (Common to All Apps)

  • Identity & Access Management (IAM): Strong policies, least privilege access, and multi-factor authentication (MFA)
  • Encryption: Secure data in transit and at rest
  • Threat Detection: Implement tools like AWS GuardDuty or Microsoft Defender for Cloud
  • Vulnerability Management: Regular scans, patching, and secure development practices
  • Logging & Monitoring: Centralized, tamper-resistant logs with alerts for anomalies
  • Incident Response: A tested plan for detection, containment, and recovery
  • Secure Configuration: Hardened operating systems, container images, and cloud environments

These are your baseline defenses, no matter if you’re in healthcare, education, or any other sector. Think of them as your universal “security hygiene.”

When evaluating what’s missing in your WAF implementation, context is everything. You can’t protect what you haven’t defined. Start with your industry’s specific requirements, then align those needs with the Security Pillar’s core principles. Only then can you ensure your architecture isn’t just well-structured but also well-defended.

Leave a comment

I’m Aqueelah

Cybersecurity isn’t just my profession, it’s a passion I share with the most important person in my life: my daughter. As I grow in this ever-evolving field, I see it through both a professional lens and a mother’s eyes, understanding the critical need to protect our digital spaces for future generations.


Read about my mission to combat job scams

Scammers are targeting job seekers with increasing sophistication. I developed a Zero Trust-based framework: Project TRUSThire and submitted it to NIST to help protect digital hiring. Learn what this means for cybersecurity and community safety.

Read the Article

🎧 Listen to the CyberMom Plus One Podcast!

Disclaimer:

“I bring my background in cybersecurity and motherhood to everything I share, offering insights grounded in real experience and professional expertise. The information provided is for general educational purposes only and is not a substitute for personalized legal, technical, or consulting advice.
AQ’s Corner LLC and its affiliates assume no liability for actions or decisions taken based on this content. Please evaluate your own circumstances and consult a qualified professional before making decisions related to cybersecurity, compliance, or digital safety.”
.wp-block-site-title a { color: #3ABAEB !important; transition: color 0.3s ease; } .wp-block-site-title a:hover { color: #E967B8 !important; }