AWS WAF Cost Calculator
Estimate AWS WAF-style costs with a simple model: Web ACL monthly fees + rule monthly fees + request charges. Compare baseline vs peak requests with your pricing.
Maintained by CloudCostKit Editorial Team. Last updated: 2026-02-07. Editorial policy and methodology.
Best next steps
Use this calculator for the first estimate, then validate the answer with the closest guide or companion tool.
Inputs
Results
AWS WAF cost is a layered security bill, and attacks can create a second bill beside it
The visible WAF line items are only the first layer: Web ACLs, rules, and evaluated requests. In practice, attack periods also create downstream logging, scan, and analysis costs that make the true incident month more expensive than the WAF charge alone suggests.
- ACL inventory: the steady monthly security surface across accounts, regions, and environments.
- Rule inventory: managed and custom logic that grows as protection coverage expands.
- Evaluated requests: the variable layer that spikes during attacks, bot waves, or sudden traffic shifts.
Where WAF estimates usually drift
- Baseline traffic is modeled carefully, but blocked traffic and attack windows are undercounted or ignored.
- Rule inventory expands gradually across regions and environments after the original estimate was made.
- Teams review the WAF invoice but forget that log ingestion and query costs exploded at the same time.
- One blended request assumption hides the difference between a quiet month and a defensive month.
What to review before trusting the WAF baseline
- Count Web ACLs and rules by environment and region so the steady security surface is visible.
- Estimate evaluated requests with blocked traffic included, not just successful application traffic.
- Model attack or bot weeks separately because request-based charges are the first part of the defensive cost story.
- Keep downstream logging and analytics nearby so the incident month is not falsely treated as a pure WAF problem.
Baseline vs attack-expanded WAF scenarios
| Scenario | ACLs | Rules | Requests |
|---|---|---|---|
| Baseline | Configured | Configured | Expected |
| Peak | Same | Same | Attack/bot spike |
How to review the first real WAF incident month
- Check whether the miss came from evaluated-request spikes, inventory growth, or downstream observability costs before changing the entire model.
- Review attack periods separately so a few defensive days do not disappear inside one monthly average.
Next steps
Example scenario
- 2 Web ACLs, 20 rules, and 200M requests/month using $5/ACL, $1/rule, and $0.60 per 1M requests.
- Peak 220% scenario helps budget for attack or bot spikes.
Included
- Web ACL baseline: number of ACLs x $ per ACL-month.
- Rule baseline: number of rules x $ per rule-month.
- Request charges: requests/month x $ per million requests.
- Baseline vs peak scenario table for request spikes.
Not included
- Bot control, CAPTCHA/challenge features, and managed add-ons unless modeled separately.
- Log storage/analysis and downstream security tooling ingestion.
How we calculate
- ACL cost = web ACLs x $ per ACL-month.
- Rules cost = rules x $ per rule-month.
- Request cost = (requests per month / 1,000,000) x $ per 1M requests.
- Total = ACL + rules + requests.
FAQ
What should I count as a rule?
Why does cost spike during an attack?
How can I reduce WAF cost?
Related tools
Related guides
Disclaimer
Educational use only. Not legal, financial, or professional advice. Results are estimates based on the inputs and assumptions shown on this page. Verify pricing and limits with your providers and documentation.
Last updated: 2026-02-07. Reviewed against CloudCostKit methodology and current provider documentation. See the Editorial Policy .