Overview
You can use AWS WAF to create custom, application-specific rules that block attack patterns to help ensure application availability, secure resources, and prevent excessive resource consumption.
This AWS Solution supports the latest version of the AWS WAF (AWS WAFV2) service API.
Benefits
Automatically launch and configure the AWS WAF settings and protective features that you choose to include during initial deployment by using the AWS CloudFormation template.
Activate AWS CloudFormation to provision an Amazon Athena query and a scheduled AWS Lambda function responsible for orchestrating Athena, processing result output, and updating AWS WAF.
Build a customized dashboard to visualize Amazon CloudWatch metrics emitted by this solution, and gain insights into the pattern of attacks and protection provided by AWS WAF.
Technical details
You can automatically deploy this architecture using the implementation guide and the accompanying AWS CloudFormation template.
A. AWS managed rules
This set of AWS Managed Rules provides protection against exploitation of a wide range of common application vulnerabilities or other unwanted traffic.
Total results: 5
- Headline
-
Cloud Foundations
-
Small & Medium Business
-
Security, Identity & Compliance
Total results: 1
- Publish Date
-
- Version: 4.0.6
- Released: 12/2024
- Author: AWS
- Est. deployment time: 15 mins
- Estimated cost: See details
Note: Before you launch the solution in the AWS Management Console, ensure that you meet the prerequisites in the implementation guide.
Related content
This course provides an overview of AWS security technology, use cases, benefits, and services. The infrastructure protection section covers AWS WAF for traffic filtering.
Amazon Macie is a security service that uses machine learning to automatically discover, classify, and protect sensitive data in AWS. In this course, you will be introduced to Amazon Macie, how the service works, and the underlying concepts driving the service.
This exam tests your technical expertise in securing the AWS platform. This is for anyone in an experienced security role.
So Peach turned to AWS for a solution, and now Peach not only blocks cyberattacks but also deters them—reducing needless service slowdowns and boosting customer confidence.