SlideShare a Scribd company logo
1 of 32
Download to read offline
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
How Dow Jones uses AWS to create a
secure perimeter
Kamal Verma
Sr. Principal
Dow Jones and Company
S D D 3 1 6
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Dow Jones brings together world-leading data, media, membership and
intelligence solutions to power the most ambitious companies and professionals.
https://www.dowjones.com
https://dowjones.jobs
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Why ?
1. Forming a protective ring around our applications, like saturn
2. Being nimble - alternative to current edge provider
3. Application security
4. Operational security
5. Certificate management and automation
6. Inclement state alarms
7. Advanced SIEM
8. Monitoring and operations
9. Error pages - standard error pages for 50x errors
10. Performance
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
1. Layer 4 – Shield Advanced
2. Layer 7 – AWS WAF OWASP top 10
3. Monitoring – Error rates and web-attack alarms
4. Logging – Using Amazon Athena to search cloud-front logs
5. Performance – out of band abuse processing and reporting
6. AWS Lambda @Edge – JWT validation
7. Simplified SPA patterns – Simplification of an app
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Icon by Freepik from www.flaticon.com
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Edge computing
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Edge computing layers
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Edge computing layers
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Edge computing layers
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Edge computing layers
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Edge computing layers
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Edge computing layers
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Edge computing layers
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS WAF: application security
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Edge computing layers
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
High rate abuse case and rate control
● IP based rate controls fail
○ NAT IPs – One abuser punishes all the users
○ Rerouted traffic is not controlled
● Unauthenticated session
○ If you don’t have one – you get one
○ Rate control apply on this session
● Tie unauthenticated session to authenticated one
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Bots protection
● Bots’ signature is identified
● Adjust the AWS WAF to keep the bots’ out
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Edge computing layers
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
SQL query
select * from example.cf
where time_taken > 4
limit 5
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
SQL query
WITH ds AS
(SELECT *,
parse_datetime( concat( concat( format_datetime(date,
'yyyy-MM-dd'), '-' ), time ),'yyyy-MM-dd-HH:mm:ss') AS datetime
FROM ”table1"."cf"
WHERE src=’example.com'
and uri = ’/content/search'
and date = date('2019-04-12')
and method = 'GET')
SELECT *
FROM ds
WHERE datetime
BETWEEN timestamp '2019-04-12 18:00:00'
AND timestamp '2019-04-12 18:05:00'
order by time
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Edge computing layers
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Alarms and integration with Slack
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Application pattern evolution
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Poor communication hygiene
Chrome
browser
tls
1
tls
2
tls
3
tls
4
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Serverless SPA
tls
1
tls
2
Chrome
browser
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Serverless SPA – Amazon Simple Service (Amazon S3)
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Performance
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Performance of HTTPS/TCP
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Performance of HTTPS/TCP
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Performance of HTTPS/TCP
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
High availability
Thank you!
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Kamal Verma
Twitter: @kxrx

More Related Content

What's hot

What's hot (20)

Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
 
Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019
Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019 Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019
Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019
 
Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...
Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...
Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...
 
Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019
Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019 Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019
Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019
 
How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...
 
Privacy by design on AWS - FND202-R - AWS re:Inforce 2019
Privacy by design on AWS - FND202-R - AWS re:Inforce 2019 Privacy by design on AWS - FND202-R - AWS re:Inforce 2019
Privacy by design on AWS - FND202-R - AWS re:Inforce 2019
 
DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019
DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019 DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019
DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019
 
Using the AWS Encryption SDK for multiple master key encryption - SDD402 - AW...
Using the AWS Encryption SDK for multiple master key encryption - SDD402 - AW...Using the AWS Encryption SDK for multiple master key encryption - SDD402 - AW...
Using the AWS Encryption SDK for multiple master key encryption - SDD402 - AW...
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
 
Innovating FIPS crypto validation in the Cloud - SEP321 - AWS re:Inforce 2019
Innovating FIPS crypto validation in the Cloud - SEP321 - AWS re:Inforce 2019 Innovating FIPS crypto validation in the Cloud - SEP321 - AWS re:Inforce 2019
Innovating FIPS crypto validation in the Cloud - SEP321 - AWS re:Inforce 2019
 
In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...
In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...
In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...
 
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
 
Implementing your landing zone - FND210 - AWS re:Inforce 2019
Implementing your landing zone - FND210 - AWS re:Inforce 2019 Implementing your landing zone - FND210 - AWS re:Inforce 2019
Implementing your landing zone - FND210 - AWS re:Inforce 2019
 
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019 Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
 
AWS event engineering at scale - SEP329 - AWS re:Inforce 2019
AWS event engineering at scale - SEP329 - AWS re:Inforce 2019 AWS event engineering at scale - SEP329 - AWS re:Inforce 2019
AWS event engineering at scale - SEP329 - AWS re:Inforce 2019
 
Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019
Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019 Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019
Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019
 
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019 Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
 
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
 
Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...
Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...
Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...
 
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...
 

Similar to How Dow Jones uses AWS to create a secure perimeter around its web properties - SDD316 - AWS re:Inforce 2019

Similar to How Dow Jones uses AWS to create a secure perimeter around its web properties - SDD316 - AWS re:Inforce 2019 (20)

Automate Security Event Management Using Trust-Based Decision Models - AWS Su...
Automate Security Event Management Using Trust-Based Decision Models - AWS Su...Automate Security Event Management Using Trust-Based Decision Models - AWS Su...
Automate Security Event Management Using Trust-Based Decision Models - AWS Su...
 
NIST Compliance, AWS Federal Pop-Up Loft
NIST Compliance, AWS Federal Pop-Up LoftNIST Compliance, AWS Federal Pop-Up Loft
NIST Compliance, AWS Federal Pop-Up Loft
 
Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...
Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...
Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...
 
Security Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWS
Security Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWSSecurity Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWS
Security Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWS
 
2. migration, disaster recovery and business continuity in the cloud
2. migration, disaster recovery and business continuity in the cloud2. migration, disaster recovery and business continuity in the cloud
2. migration, disaster recovery and business continuity in the cloud
 
Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019
Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019
Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019
 
Securing your Amazon SageMaker model development in a highly regulated enviro...
Securing your Amazon SageMaker model development in a highly regulated enviro...Securing your Amazon SageMaker model development in a highly regulated enviro...
Securing your Amazon SageMaker model development in a highly regulated enviro...
 
Are you Well Architected?
Are you Well Architected?Are you Well Architected?
Are you Well Architected?
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
 
Analyzing your web and application logs on AWS. Utrecht AWS Dev Day
Analyzing your web and application logs on AWS. Utrecht AWS Dev DayAnalyzing your web and application logs on AWS. Utrecht AWS Dev Day
Analyzing your web and application logs on AWS. Utrecht AWS Dev Day
 
Generational shiftsRedefining Customer Experience And The Way To Insure
Generational shiftsRedefining Customer Experience And The Way To InsureGenerational shiftsRedefining Customer Experience And The Way To Insure
Generational shiftsRedefining Customer Experience And The Way To Insure
 
"Analyzing your web and application logs", Javier Ramirez, AWS Dev Day Kyiv 2...
"Analyzing your web and application logs", Javier Ramirez, AWS Dev Day Kyiv 2..."Analyzing your web and application logs", Javier Ramirez, AWS Dev Day Kyiv 2...
"Analyzing your web and application logs", Javier Ramirez, AWS Dev Day Kyiv 2...
 
Security Framework Shakedown
Security Framework ShakedownSecurity Framework Shakedown
Security Framework Shakedown
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
Inovação Rápida: O caso de negócio para desenvolvimento de aplicações modernas.
Inovação Rápida: O caso de negócio para desenvolvimento de aplicações modernas.Inovação Rápida: O caso de negócio para desenvolvimento de aplicações modernas.
Inovação Rápida: O caso de negócio para desenvolvimento de aplicações modernas.
 
Building a Better Business Case for Migrating to Cloud
Building a Better Business Case for Migrating to CloudBuilding a Better Business Case for Migrating to Cloud
Building a Better Business Case for Migrating to Cloud
 
Security Framework Shakedown: Chart Your Journey with AWS Best Practices
Security Framework Shakedown: Chart Your Journey with AWS Best PracticesSecurity Framework Shakedown: Chart Your Journey with AWS Best Practices
Security Framework Shakedown: Chart Your Journey with AWS Best Practices
 
Developing-Effective-Mass-Migration-Strategy-out-of-a-Tool-based-Portfolio-As...
Developing-Effective-Mass-Migration-Strategy-out-of-a-Tool-based-Portfolio-As...Developing-Effective-Mass-Migration-Strategy-out-of-a-Tool-based-Portfolio-As...
Developing-Effective-Mass-Migration-Strategy-out-of-a-Tool-based-Portfolio-As...
 
Take action on your security & compliance alerts with AWS Security Hub - SEC2...
Take action on your security & compliance alerts with AWS Security Hub - SEC2...Take action on your security & compliance alerts with AWS Security Hub - SEC2...
Take action on your security & compliance alerts with AWS Security Hub - SEC2...
 
"How to build a global serverless service", Alex Casalboni, AWS Dev Day Kyiv ...
"How to build a global serverless service", Alex Casalboni, AWS Dev Day Kyiv ..."How to build a global serverless service", Alex Casalboni, AWS Dev Day Kyiv ...
"How to build a global serverless service", Alex Casalboni, AWS Dev Day Kyiv ...
 

More from Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

How Dow Jones uses AWS to create a secure perimeter around its web properties - SDD316 - AWS re:Inforce 2019

  • 1. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. How Dow Jones uses AWS to create a secure perimeter Kamal Verma Sr. Principal Dow Jones and Company S D D 3 1 6
  • 2. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Dow Jones brings together world-leading data, media, membership and intelligence solutions to power the most ambitious companies and professionals. https://www.dowjones.com https://dowjones.jobs
  • 3. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Why ? 1. Forming a protective ring around our applications, like saturn 2. Being nimble - alternative to current edge provider 3. Application security 4. Operational security 5. Certificate management and automation 6. Inclement state alarms 7. Advanced SIEM 8. Monitoring and operations 9. Error pages - standard error pages for 50x errors 10. Performance
  • 4. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda 1. Layer 4 – Shield Advanced 2. Layer 7 – AWS WAF OWASP top 10 3. Monitoring – Error rates and web-attack alarms 4. Logging – Using Amazon Athena to search cloud-front logs 5. Performance – out of band abuse processing and reporting 6. AWS Lambda @Edge – JWT validation 7. Simplified SPA patterns – Simplification of an app
  • 5. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Icon by Freepik from www.flaticon.com
  • 6. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Edge computing
  • 7. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Edge computing layers
  • 8. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Edge computing layers
  • 9. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Edge computing layers
  • 10. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Edge computing layers
  • 11. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Edge computing layers
  • 12. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Edge computing layers
  • 13. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Edge computing layers
  • 14. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS WAF: application security
  • 15. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Edge computing layers
  • 16. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. High rate abuse case and rate control ● IP based rate controls fail ○ NAT IPs – One abuser punishes all the users ○ Rerouted traffic is not controlled ● Unauthenticated session ○ If you don’t have one – you get one ○ Rate control apply on this session ● Tie unauthenticated session to authenticated one
  • 17. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Bots protection ● Bots’ signature is identified ● Adjust the AWS WAF to keep the bots’ out
  • 18. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Edge computing layers
  • 19. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. SQL query select * from example.cf where time_taken > 4 limit 5
  • 20. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. SQL query WITH ds AS (SELECT *, parse_datetime( concat( concat( format_datetime(date, 'yyyy-MM-dd'), '-' ), time ),'yyyy-MM-dd-HH:mm:ss') AS datetime FROM ”table1"."cf" WHERE src=’example.com' and uri = ’/content/search' and date = date('2019-04-12') and method = 'GET') SELECT * FROM ds WHERE datetime BETWEEN timestamp '2019-04-12 18:00:00' AND timestamp '2019-04-12 18:05:00' order by time
  • 21. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Edge computing layers
  • 22. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Alarms and integration with Slack
  • 23. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Application pattern evolution
  • 24. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Poor communication hygiene Chrome browser tls 1 tls 2 tls 3 tls 4
  • 25. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Serverless SPA tls 1 tls 2 Chrome browser
  • 26. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Serverless SPA – Amazon Simple Service (Amazon S3)
  • 27. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Performance
  • 28. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Performance of HTTPS/TCP
  • 29. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Performance of HTTPS/TCP
  • 30. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Performance of HTTPS/TCP
  • 31. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. High availability
  • 32. Thank you! © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Kamal Verma Twitter: @kxrx