AWS WAF Classic has been deprecated, and the post describes how to use the latest version of AWS WAF (WAFv2) to prevent hotlinking.Hotlinking can lead to slow loading times, lost revenue, and potential legal issues for the original site.AWS WAF integrated with Amazon CloudFront can help protect web applications against common web exploits.The article explains using header inspection in AWS WAF to prevent hotlinking while using a CDN like CloudFront.Two approaches are detailed: one with a separate subdomain and the other with content under the same domain.The first approach involves validating the Referer header, while the second approach adds filtering by path.AWS WAF configurations include web access control lists, rules, match conditions, and filters.The prerequisites include setting up a CloudFront distribution before configuring an AWS WAF web ACL.Testing the rules involves using cURL commands to verify proper protection against hotlinking.Further enhancements like rate-limiting, bot mitigation, and DDoS protections can be implemented with AWS WAF.