Step 5: Detect and Filter Malicious Web Requests Using AWS WAF Classic