SlideShare a Scribd company logo
1 of 42
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Venkat Vijayaraghavan
Product Manager, AWS Perimeter Protection (WAF & Shield)
Cloud-Native DDoS Attack Mitigation
Dec 14, 2017
Today’s Objectives
 Overview of DDoS attacks and other threats
 Evolution of DDoS mitigation strategy
 Three Pillars: Cloud Native App Protection
 Built-in Protections
 Tools For Customized Protections
 Advanced Protection
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Types of Threats on Your Application
Application
Ping of Death | ICMP Flood | Teardrop
SYN/ACK Flood | UDP Flood | Reflection
Presentation
Session
Transport
Network
Data Link
Physical
Operated & Protected by AWS
HTTP Flood, App exploits, SQL Injection, Bots, Crawlers,
SSL Abuse, Malformed SSL
On-Premise Cloud-Routed Cloud-Native
Evolution of DDoS Mitigation
 Scale network and fixed
infrastructure to mitigate DDoS
attacks on-site
 Visibility and control
 Large capital expenditures,
maintenance costs, and in-house
expertise
On Premise
 Route traffic to other networks for
better mitigation capacity, managed
services
 Mitigate larger DDoS attacks without
upfront investment or in-house
expertise
 Black box solution – can introduce
latency, additional points of failure,
increased operating costs
Cloud Routed
 Automatic, always-on DDoS protection for
all applications on AWS
 Leverage 16 AWS Regions and 100+
CloudFront Edge Locations to mitigate large
attacks close to the source
 Simple, flexible, and affordable
 Robust capabilities without undifferentiated
heavy-lifting
Cloud Native
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What is Different in AWS Cloud
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Three Pillars: Cloud Native App Protection
Built-in Protection
for Everyone
Optional Advanced
DDoS Protection
Tools for Customized
Protections
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Three Pillars: Cloud Native App Protection
Built-in Protection
for Everyone
Optional Advanced
DDoS Protection
Tools for Customized
Protections
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Built-in Protection for Everyone
 Automatic defense against the most common
network and transport layer DDoS attacks for any
AWS resource, in any AWS Region
 Comprehensive defense against all known network
and transport layer attacks when using Amazon
CloudFront and Amazon Route 53
 SYN Floods, UDP Floods, Reflection Attacks, etc.
AWS Shield Standard
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Built-in Protection for Everyone
For attacks on Amazon CloudFront & Amazon Route 53
Over 99% of Network & Transport layer attacks detected by AWS Shield
are mitigated in less than 1 second
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Built-in Protection for Everyone
AWS Shield Standard Automatically Mitigates Several DDoS Attacks Everyday
Source: AWS Global Threat Dashboard (Available for Shield Advanced customers)
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Built-in Protection for Everyone
 DNS Header Validations
 Good vs Bad Resolvers
 Priority Based Traffic Shaping
 Shuffle sharding and Anycast striping
Amazon Route 53
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Built-in Protection for Everyone
 Only Accepts valid HTTP/TCP Requests
 Automatically drop traffic on non HTTP Ports
 Protection Against Slow Reads (Slowloris)
 Safeguards Against SSL Abuse (E.g. Perfect
Forward Secrecy)
 Web Server Offload (E.g., Request Collapsing)
Amazon CloudFront
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Intro 101
Slack Uses Amazon CloudFront as a Proxy
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Slack Uses CloudFront as a Proxy
 Looking for DDoS Protection
 CloudFront & Shield Filters Malicious Traffic
Automatically
 Highly Reliable & Performant Compared to
other DDoS or CDN providers
 Tight Integration with Other AWS services like
ELB
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Slack Uses CloudFront as a Proxy
Their CloudFront Configuration:
 Caching Disabled
 Forward All Headers, Cookies, & Query strings
 TLS Termination at Edge (TLS Back to ELBs)
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Slack Uses CloudFront as a Proxy
Before
After
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Slack Uses CloudFront as a Proxy
Amazon
Route 53
ALB Security Group
Amazon
EC2
Instances
Application
Load Balancer
Amazon
CloudFront
Public Subnet
Web Application
Security Group
Private Subnet
DDoS Attack
Users
Globally distributed attack
mitigation capability
SYN proxy feature that verifies
three-way handshake before
passing to the application
Slowloris mitigation that reaps
long-lived collections
Mitigates complex attacks by
allowing only the most reliable
DNS queries
Validates DNS
Summary: A DDoS Resilient Architecture
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Built-in Protection
for Everyone
Optional Advanced
DDoS Protection
Tools for Customized
Protections
Three Pillars: Cloud Native App Protection
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Tools for Customized Protections
Choosing an
address range
Setting up subnets in
Availability Zones
Creating a route to
the Internet
Authorizing traffic
to/from the VPC
VPC Security Groups
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Tools for Customized Protections
Fast Incident
Response
Preconfigured
Protection
APIs for
Automation
Flexible Rule
Language
AWS WAF
Designed to help you defend against common web application exploits
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Tools for Customized Protections
AWS WAF Key Features
 Geo Based Rules
 Rate Based Rules
 Customizable Regex Rules
 Built-in Rules: SQLi, XSS, and Pre-Configured Templates for
Common Protections
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Intro 101
eVitamins uses AWS WAF to Protect their Web
Applications Against Common Threats
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
eVitamins uses AWS WAF for Common Threats
 DDoS was a Significant Availability Risk
 Bots & Crawlers caused Operational Burden
 Need Application Threat Protection
 Need Customizable Protection for their Application
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
 Deployed CloudFront For DDoS Protection
 AWS WAF Bad Bot Protection
• IP Reputation List
• “Honeypot” solutions
• Automated crawler protection using AWS
Lambda & WAF Integration
 AWS WAF rules for SQL Injection and XSS
 1-click CloudFormation Templates
eVitamins uses AWS WAF for Common Threats
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
 Literally, No Website Downtime due to DDoS
 Attacks on the Application Layer reduced by 90%
 Automations Decreased Response Time by 90%
eVitamins uses AWS WAF for Common Threats
Demonstration
Amazon
Route 53
ALB Security Group
Amazon
EC2
Instances
Application
Load Balancer
Amazon
CloudFront
Public Subnet
Web Application
Security Group
Private Subnet
DDoS Attack
Users
Globally distributed attack
mitigation capability
SYN proxy feature that verifies
three-way handshake before
passing to the application
Slowloris mitigation that reaps
long-lived collections
Mitigates complex attacks by
allowing only the most reliable
DNS queries
Validates DNS
Summary: A DDoS Resilient Architecture
Provides flexible rule language
to block or rate-limit malicious
requests
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Built-in Protection
for Everyone
Advanced
Protection
Tools for Customized
Protections
Three Pillars: Cloud Native App Protection
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shield Advanced Detection
 Additional Protection Against Large & Sophisticated
Attacks
 Fast escalation to the AWS DDoS Response Team
(DRT) to assist with complex cases (like HTTP flood)
 Attack visibility and enhanced detection
 Cost Protection to mitigate economic attack vectors
 AWS WAF for application-layer defense, at no
additional cost
AWS Shield Advanced
A Managed DDoS Protection service
Aggs
Aggs
Aggs
Aggs
Pin
Agg
Evaluators
AWS Shield Advanced Detection
Customer A
Customer B
Aggs
Aggs
Aggs
Aggs
Pin
Agg
Evaluators
AWS Shield Advanced Detection
Aggs
Aggs
Aggs
Aggs
Pin
Agg
Evalu
ators
Customer B
Customer A
DB
Shield
API
Cloud
Watch
AWS Shield Advanced Detection
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Advanced Protection
AWS WAF Managed Rules
 Managed Rules Written by Security Experts
 Choice of Protections from Various Security
Vendors
 Automatically updated Rules
 Purchase from AWS Marketplace
 Pay-as-you-go Pricing. No Long Term
Commitments
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS WAF Managed Rules: Featured Sellers
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Advanced Protection
AWS WAF Managed Rules
Very Easy to Enable
Go To AWS WAF Console
Discover & Subscribe to
Managed Rules
Associate with to your AWS
WAF web ACL
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Summary: TakeAways
AWS Automatically Protects You Against DDoS Attacks
Using Amazon CloudFront & Amazon Route 53
AWS Gives Additional Tools For Customizations
Using AWS WAF & VPC Security Groups
AWS Also Provides Optional Advanced Protection
Using AWS Shield Advanced & AWS WAF Managed Rules
Questions?
@cloudfront
Thank You

More Related Content

What's hot

AWS re:Invent 2016: Mitigating DDoS Attacks on AWS: Five Vectors and Four Use...
AWS re:Invent 2016: Mitigating DDoS Attacks on AWS: Five Vectors and Four Use...AWS re:Invent 2016: Mitigating DDoS Attacks on AWS: Five Vectors and Four Use...
AWS re:Invent 2016: Mitigating DDoS Attacks on AWS: Five Vectors and Four Use...Amazon Web Services
 
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...Amazon Web Services
 
Replacing Tape Backups with AWS Storage Gateway - AWS Online Tech Talks
Replacing Tape Backups with AWS Storage Gateway - AWS Online Tech TalksReplacing Tape Backups with AWS Storage Gateway - AWS Online Tech Talks
Replacing Tape Backups with AWS Storage Gateway - AWS Online Tech TalksAmazon Web Services
 
(STG205) Secure Content Delivery Using Amazon CloudFront
(STG205) Secure Content Delivery Using Amazon CloudFront(STG205) Secure Content Delivery Using Amazon CloudFront
(STG205) Secure Content Delivery Using Amazon CloudFrontAmazon Web Services
 
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...Amazon Web Services
 
AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar Amazon Web Services
 
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity OptionsCreating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity OptionsAmazon Web Services
 
(NET302) Delivering a DBaaS Using Advanced AWS Networking
(NET302) Delivering a DBaaS Using Advanced AWS Networking(NET302) Delivering a DBaaS Using Advanced AWS Networking
(NET302) Delivering a DBaaS Using Advanced AWS NetworkingAmazon Web Services
 
Creating your virtual data center - Toronto
Creating your virtual data center - TorontoCreating your virtual data center - Toronto
Creating your virtual data center - TorontoAmazon Web Services
 
AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...
AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...
AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...Amazon Web Services
 
網路安全自動化 - 縮短應用維安的作業時間
網路安全自動化 - 縮短應用維安的作業時間網路安全自動化 - 縮短應用維安的作業時間
網路安全自動化 - 縮短應用維安的作業時間Amazon Web Services
 
AWS re:Invent 2016: Extending Datacenters to the Cloud: Connectivity Options ...
AWS re:Invent 2016: Extending Datacenters to the Cloud: Connectivity Options ...AWS re:Invent 2016: Extending Datacenters to the Cloud: Connectivity Options ...
AWS re:Invent 2016: Extending Datacenters to the Cloud: Connectivity Options ...Amazon Web Services
 
Cloud-Native DDoS Attack Mitigation
Cloud-Native DDoS Attack MitigationCloud-Native DDoS Attack Mitigation
Cloud-Native DDoS Attack MitigationAmazon Web Services
 
(SEC323) New: Securing Web Applications with AWS WAF
(SEC323) New: Securing Web Applications with AWS WAF(SEC323) New: Securing Web Applications with AWS WAF
(SEC323) New: Securing Web Applications with AWS WAFAmazon Web Services
 
ABD212 sap hana the foundation of sap’s digital core no notes
ABD212 sap hana the foundation of sap’s digital core no notesABD212 sap hana the foundation of sap’s digital core no notes
ABD212 sap hana the foundation of sap’s digital core no notesAmazon Web Services
 
Enterprise summit – architecting microservices on aws final v2
Enterprise summit – architecting microservices on aws   final v2Enterprise summit – architecting microservices on aws   final v2
Enterprise summit – architecting microservices on aws final v2Amazon Web Services
 
Amazon EC2 and Amazon VPC Hands-On Workshop
Amazon EC2 and Amazon VPC Hands-On WorkshopAmazon EC2 and Amazon VPC Hands-On Workshop
Amazon EC2 and Amazon VPC Hands-On WorkshopAmazon Web Services
 
Deep-Dive for AWS X-Ray - DEV402 - re:Invent 2017
Deep-Dive for AWS X-Ray - DEV402 - re:Invent 2017Deep-Dive for AWS X-Ray - DEV402 - re:Invent 2017
Deep-Dive for AWS X-Ray - DEV402 - re:Invent 2017Amazon Web Services
 
Deep Dive on Amazon Relational Database Service
Deep Dive on Amazon Relational Database ServiceDeep Dive on Amazon Relational Database Service
Deep Dive on Amazon Relational Database ServiceAmazon Web Services
 
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Web Services
 

What's hot (20)

AWS re:Invent 2016: Mitigating DDoS Attacks on AWS: Five Vectors and Four Use...
AWS re:Invent 2016: Mitigating DDoS Attacks on AWS: Five Vectors and Four Use...AWS re:Invent 2016: Mitigating DDoS Attacks on AWS: Five Vectors and Four Use...
AWS re:Invent 2016: Mitigating DDoS Attacks on AWS: Five Vectors and Four Use...
 
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
 
Replacing Tape Backups with AWS Storage Gateway - AWS Online Tech Talks
Replacing Tape Backups with AWS Storage Gateway - AWS Online Tech TalksReplacing Tape Backups with AWS Storage Gateway - AWS Online Tech Talks
Replacing Tape Backups with AWS Storage Gateway - AWS Online Tech Talks
 
(STG205) Secure Content Delivery Using Amazon CloudFront
(STG205) Secure Content Delivery Using Amazon CloudFront(STG205) Secure Content Delivery Using Amazon CloudFront
(STG205) Secure Content Delivery Using Amazon CloudFront
 
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...
 
AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar
 
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity OptionsCreating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
 
(NET302) Delivering a DBaaS Using Advanced AWS Networking
(NET302) Delivering a DBaaS Using Advanced AWS Networking(NET302) Delivering a DBaaS Using Advanced AWS Networking
(NET302) Delivering a DBaaS Using Advanced AWS Networking
 
Creating your virtual data center - Toronto
Creating your virtual data center - TorontoCreating your virtual data center - Toronto
Creating your virtual data center - Toronto
 
AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...
AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...
AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...
 
網路安全自動化 - 縮短應用維安的作業時間
網路安全自動化 - 縮短應用維安的作業時間網路安全自動化 - 縮短應用維安的作業時間
網路安全自動化 - 縮短應用維安的作業時間
 
AWS re:Invent 2016: Extending Datacenters to the Cloud: Connectivity Options ...
AWS re:Invent 2016: Extending Datacenters to the Cloud: Connectivity Options ...AWS re:Invent 2016: Extending Datacenters to the Cloud: Connectivity Options ...
AWS re:Invent 2016: Extending Datacenters to the Cloud: Connectivity Options ...
 
Cloud-Native DDoS Attack Mitigation
Cloud-Native DDoS Attack MitigationCloud-Native DDoS Attack Mitigation
Cloud-Native DDoS Attack Mitigation
 
(SEC323) New: Securing Web Applications with AWS WAF
(SEC323) New: Securing Web Applications with AWS WAF(SEC323) New: Securing Web Applications with AWS WAF
(SEC323) New: Securing Web Applications with AWS WAF
 
ABD212 sap hana the foundation of sap’s digital core no notes
ABD212 sap hana the foundation of sap’s digital core no notesABD212 sap hana the foundation of sap’s digital core no notes
ABD212 sap hana the foundation of sap’s digital core no notes
 
Enterprise summit – architecting microservices on aws final v2
Enterprise summit – architecting microservices on aws   final v2Enterprise summit – architecting microservices on aws   final v2
Enterprise summit – architecting microservices on aws final v2
 
Amazon EC2 and Amazon VPC Hands-On Workshop
Amazon EC2 and Amazon VPC Hands-On WorkshopAmazon EC2 and Amazon VPC Hands-On Workshop
Amazon EC2 and Amazon VPC Hands-On Workshop
 
Deep-Dive for AWS X-Ray - DEV402 - re:Invent 2017
Deep-Dive for AWS X-Ray - DEV402 - re:Invent 2017Deep-Dive for AWS X-Ray - DEV402 - re:Invent 2017
Deep-Dive for AWS X-Ray - DEV402 - re:Invent 2017
 
Deep Dive on Amazon Relational Database Service
Deep Dive on Amazon Relational Database ServiceDeep Dive on Amazon Relational Database Service
Deep Dive on Amazon Relational Database Service
 
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
 

Similar to Cloud-Native DDoS Mitigation - AWS Online Tech Talks

Cloud-Native App Protection: Web Application Security at Pearson and other cu...
Cloud-Native App Protection: Web Application Security at Pearson and other cu...Cloud-Native App Protection: Web Application Security at Pearson and other cu...
Cloud-Native App Protection: Web Application Security at Pearson and other cu...Amazon Web Services
 
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)Amazon Web Services
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSAmazon Web Services
 
Intro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on awsIntro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on awsBela Sojina MBA, PMP
 
Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Amazon Web Services
 
Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...
Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...
Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...Amazon Web Services
 
Automating DDoS and WAF Response
Automating DDoS and WAF ResponseAutomating DDoS and WAF Response
Automating DDoS and WAF ResponseAmazon Web Services
 
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Amazon Web Services
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSAmazon Web Services
 
Introduction to Threat Detection and Remediation
Introduction to Threat Detection and RemediationIntroduction to Threat Detection and Remediation
Introduction to Threat Detection and RemediationAmazon Web Services
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSAmazon Web Services
 
Edge immersion days module 2 - protect your application at the edge using a...
Edge immersion days   module 2 - protect your application at the edge using a...Edge immersion days   module 2 - protect your application at the edge using a...
Edge immersion days module 2 - protect your application at the edge using a...RoiElbaz1
 
20180514 _aws data-security_aws.compressed
20180514 _aws data-security_aws.compressed20180514 _aws data-security_aws.compressed
20180514 _aws data-security_aws.compressedSekretariat3A
 
Learn how AWS customers are implementing robust security posture for their A...
 Learn how AWS customers are implementing robust security posture for their A... Learn how AWS customers are implementing robust security posture for their A...
Learn how AWS customers are implementing robust security posture for their A...Amazon Web Services
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWSAmazon Web Services
 
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduAWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduVladimir Simek
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAmazon Web Services
 

Similar to Cloud-Native DDoS Mitigation - AWS Online Tech Talks (20)

Cloud-Native App Protection: Web Application Security at Pearson and other cu...
Cloud-Native App Protection: Web Application Security at Pearson and other cu...Cloud-Native App Protection: Web Application Security at Pearson and other cu...
Cloud-Native App Protection: Web Application Security at Pearson and other cu...
 
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWS
 
Intro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on awsIntro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on aws
 
Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018
 
Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...
Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...
Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...
 
Automating DDoS and WAF Response
Automating DDoS and WAF ResponseAutomating DDoS and WAF Response
Automating DDoS and WAF Response
 
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWS
 
Introduction to Threat Detection and Remediation
Introduction to Threat Detection and RemediationIntroduction to Threat Detection and Remediation
Introduction to Threat Detection and Remediation
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWS
 
Edge immersion days module 2 - protect your application at the edge using a...
Edge immersion days   module 2 - protect your application at the edge using a...Edge immersion days   module 2 - protect your application at the edge using a...
Edge immersion days module 2 - protect your application at the edge using a...
 
20180514 _aws data-security_aws.compressed
20180514 _aws data-security_aws.compressed20180514 _aws data-security_aws.compressed
20180514 _aws data-security_aws.compressed
 
194325_EdgeatScale_NoNotes.pptx
194325_EdgeatScale_NoNotes.pptx194325_EdgeatScale_NoNotes.pptx
194325_EdgeatScale_NoNotes.pptx
 
Learn how AWS customers are implementing robust security posture for their A...
 Learn how AWS customers are implementing robust security posture for their A... Learn how AWS customers are implementing robust security posture for their A...
Learn how AWS customers are implementing robust security posture for their A...
 
DDoS Protection
DDoS ProtectionDDoS Protection
DDoS Protection
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWS
 
AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
 
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduAWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics Webinar
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Cloud-Native DDoS Mitigation - AWS Online Tech Talks

  • 1. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Venkat Vijayaraghavan Product Manager, AWS Perimeter Protection (WAF & Shield) Cloud-Native DDoS Attack Mitigation Dec 14, 2017
  • 2. Today’s Objectives  Overview of DDoS attacks and other threats  Evolution of DDoS mitigation strategy  Three Pillars: Cloud Native App Protection  Built-in Protections  Tools For Customized Protections  Advanced Protection
  • 3. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Types of Threats on Your Application Application Ping of Death | ICMP Flood | Teardrop SYN/ACK Flood | UDP Flood | Reflection Presentation Session Transport Network Data Link Physical Operated & Protected by AWS HTTP Flood, App exploits, SQL Injection, Bots, Crawlers, SSL Abuse, Malformed SSL
  • 5.  Scale network and fixed infrastructure to mitigate DDoS attacks on-site  Visibility and control  Large capital expenditures, maintenance costs, and in-house expertise On Premise
  • 6.  Route traffic to other networks for better mitigation capacity, managed services  Mitigate larger DDoS attacks without upfront investment or in-house expertise  Black box solution – can introduce latency, additional points of failure, increased operating costs Cloud Routed
  • 7.  Automatic, always-on DDoS protection for all applications on AWS  Leverage 16 AWS Regions and 100+ CloudFront Edge Locations to mitigate large attacks close to the source  Simple, flexible, and affordable  Robust capabilities without undifferentiated heavy-lifting Cloud Native
  • 8. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What is Different in AWS Cloud
  • 9. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Three Pillars: Cloud Native App Protection Built-in Protection for Everyone Optional Advanced DDoS Protection Tools for Customized Protections
  • 10. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Three Pillars: Cloud Native App Protection Built-in Protection for Everyone Optional Advanced DDoS Protection Tools for Customized Protections
  • 11. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Built-in Protection for Everyone  Automatic defense against the most common network and transport layer DDoS attacks for any AWS resource, in any AWS Region  Comprehensive defense against all known network and transport layer attacks when using Amazon CloudFront and Amazon Route 53  SYN Floods, UDP Floods, Reflection Attacks, etc. AWS Shield Standard
  • 12. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Built-in Protection for Everyone For attacks on Amazon CloudFront & Amazon Route 53 Over 99% of Network & Transport layer attacks detected by AWS Shield are mitigated in less than 1 second
  • 13. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Built-in Protection for Everyone AWS Shield Standard Automatically Mitigates Several DDoS Attacks Everyday Source: AWS Global Threat Dashboard (Available for Shield Advanced customers)
  • 14. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Built-in Protection for Everyone  DNS Header Validations  Good vs Bad Resolvers  Priority Based Traffic Shaping  Shuffle sharding and Anycast striping Amazon Route 53
  • 15. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Built-in Protection for Everyone  Only Accepts valid HTTP/TCP Requests  Automatically drop traffic on non HTTP Ports  Protection Against Slow Reads (Slowloris)  Safeguards Against SSL Abuse (E.g. Perfect Forward Secrecy)  Web Server Offload (E.g., Request Collapsing) Amazon CloudFront
  • 16. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Intro 101 Slack Uses Amazon CloudFront as a Proxy
  • 17. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Slack Uses CloudFront as a Proxy  Looking for DDoS Protection  CloudFront & Shield Filters Malicious Traffic Automatically  Highly Reliable & Performant Compared to other DDoS or CDN providers  Tight Integration with Other AWS services like ELB
  • 18. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Slack Uses CloudFront as a Proxy Their CloudFront Configuration:  Caching Disabled  Forward All Headers, Cookies, & Query strings  TLS Termination at Edge (TLS Back to ELBs)
  • 19. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Slack Uses CloudFront as a Proxy Before After
  • 20. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Slack Uses CloudFront as a Proxy
  • 21. Amazon Route 53 ALB Security Group Amazon EC2 Instances Application Load Balancer Amazon CloudFront Public Subnet Web Application Security Group Private Subnet DDoS Attack Users Globally distributed attack mitigation capability SYN proxy feature that verifies three-way handshake before passing to the application Slowloris mitigation that reaps long-lived collections Mitigates complex attacks by allowing only the most reliable DNS queries Validates DNS Summary: A DDoS Resilient Architecture
  • 22. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Built-in Protection for Everyone Optional Advanced DDoS Protection Tools for Customized Protections Three Pillars: Cloud Native App Protection
  • 23. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Tools for Customized Protections Choosing an address range Setting up subnets in Availability Zones Creating a route to the Internet Authorizing traffic to/from the VPC VPC Security Groups
  • 24. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Tools for Customized Protections Fast Incident Response Preconfigured Protection APIs for Automation Flexible Rule Language AWS WAF Designed to help you defend against common web application exploits
  • 25. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Tools for Customized Protections AWS WAF Key Features  Geo Based Rules  Rate Based Rules  Customizable Regex Rules  Built-in Rules: SQLi, XSS, and Pre-Configured Templates for Common Protections
  • 26. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Intro 101 eVitamins uses AWS WAF to Protect their Web Applications Against Common Threats
  • 27. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. eVitamins uses AWS WAF for Common Threats  DDoS was a Significant Availability Risk  Bots & Crawlers caused Operational Burden  Need Application Threat Protection  Need Customizable Protection for their Application
  • 28. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.  Deployed CloudFront For DDoS Protection  AWS WAF Bad Bot Protection • IP Reputation List • “Honeypot” solutions • Automated crawler protection using AWS Lambda & WAF Integration  AWS WAF rules for SQL Injection and XSS  1-click CloudFormation Templates eVitamins uses AWS WAF for Common Threats
  • 29. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.  Literally, No Website Downtime due to DDoS  Attacks on the Application Layer reduced by 90%  Automations Decreased Response Time by 90% eVitamins uses AWS WAF for Common Threats
  • 31. Amazon Route 53 ALB Security Group Amazon EC2 Instances Application Load Balancer Amazon CloudFront Public Subnet Web Application Security Group Private Subnet DDoS Attack Users Globally distributed attack mitigation capability SYN proxy feature that verifies three-way handshake before passing to the application Slowloris mitigation that reaps long-lived collections Mitigates complex attacks by allowing only the most reliable DNS queries Validates DNS Summary: A DDoS Resilient Architecture Provides flexible rule language to block or rate-limit malicious requests
  • 32. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Built-in Protection for Everyone Advanced Protection Tools for Customized Protections Three Pillars: Cloud Native App Protection
  • 33. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shield Advanced Detection  Additional Protection Against Large & Sophisticated Attacks  Fast escalation to the AWS DDoS Response Team (DRT) to assist with complex cases (like HTTP flood)  Attack visibility and enhanced detection  Cost Protection to mitigate economic attack vectors  AWS WAF for application-layer defense, at no additional cost AWS Shield Advanced A Managed DDoS Protection service
  • 37. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Advanced Protection AWS WAF Managed Rules  Managed Rules Written by Security Experts  Choice of Protections from Various Security Vendors  Automatically updated Rules  Purchase from AWS Marketplace  Pay-as-you-go Pricing. No Long Term Commitments
  • 38. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS WAF Managed Rules: Featured Sellers
  • 39. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Advanced Protection AWS WAF Managed Rules Very Easy to Enable Go To AWS WAF Console Discover & Subscribe to Managed Rules Associate with to your AWS WAF web ACL
  • 40. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Summary: TakeAways AWS Automatically Protects You Against DDoS Attacks Using Amazon CloudFront & Amazon Route 53 AWS Gives Additional Tools For Customizations Using AWS WAF & VPC Security Groups AWS Also Provides Optional Advanced Protection Using AWS Shield Advanced & AWS WAF Managed Rules