SlideShare a Scribd company logo
1 of 19
AWS WAF
How to protect your site from
DDoS
Web attacks like SQL injection and Cross-Site Scripting can be devastating, resulting in massive
data breaches, customer turnover, notification costs, lawsuits, and fines.
AWS WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that
are forwarded to Amazon CloudFront and lets you control access to your content. Based on
conditions that you specify, such as the IP addresses that requests originate from, or the
values of query strings, CloudFront responds to requests either with the requested content or
with an HTTP 403 status code (Forbidden). You can also configure CloudFront to return a
custom error page when a request is blocked
The first illustration shows an infrastructure trying to respond to all requests,
an approach that exhausts the web server’s resources. The second illustration
shows a resilient infrastructure that uses AWS WAF, which blocks requests
originating from blacklisted sources.
AWS WAF is a relatively new service only recently brought out of Beta. This
service is tightly coupled to the CloudFront CDN service. The WAF service
reviews traffic that is passing through the CDN and, based off defined rules,
tells the CDN to either block or allow the traffic. To use this service, all site
traffic must pass through a CloudFront CDN.
AWS WAF helps in preventing from a lot of attacks, but DDoS is the most
common form of attack and also the most difficult to curb, let us start with
what exactly is a DDoS attack.
DDoS Attacks
A Denial of Service (DoS) attack is an attack that can make your website or
application unavailable to end users. To achieve this, attackers use a variety of
techniques that consume network or other resources, disrupting access for
legitimate end users.
Diagram of a DOS attack
In its simplest form, a DoS attack against a target is executed by a lone
attacker from a single source, as shown below:
In the case of a Distributed Denial of Service (DDoS) attack, an attacker uses
multiple sources—which may be compromised or controlled by a group of
collaborators—to orchestrate an attack against a target. As illustrated below,
in a DDoS attack, each of the collaborators or compromised hosts participates
in the attack, generating a flood of packets or requests to overwhelm the
intended target.
Diagram of a DDOS attack
DDoS attacks are most common at layers 3, 4, 6, and 7 of the Open Systems
Interconnection (OSI) model, which is described in the above table. Layer 3
and 4 attacks correspond to the Network and Transport layers of the OSI
model. This distinction is important because the attack types directed at these
layers are different and so different techniques are used to build resiliency.
Architecture Implications
WAF can be implemented as a CloudFormation stack as illustrated in the
image below:
The CloudFormation stack works as follows:
1. All web requests are passed through a CloudFront CDN network. All
request data is persisted to log files that reside on S3 buckets.
2. For every new request log file that is persisted, a Lambda function is
triggered to analyse the log file data. The Lambda function reviews the
traffic patterns and then updates the WAF block list based off defined
rules.
3. The WAF device blocks entry to the Elastic Load Balancer based off the
source IP address.
Features - Web Traffic Filtering
Traffic filtering is accomplished by creating specific web request conditions,
which are then grouped into rules. These rules are then associated with a
CloudFront distribution through a web access control list.
Condition - Define the basic characteristics that you want AWS WAF to watch for in web
requests.
1. Scripts that are likely to be malicious. Attackers embed scripts that can exploit
vulnerabilities in web applications; this is known as cross-site scripting.
2. The IP addresses or address ranges that requests originate from.
3. The length of specified parts of the request (Header, HTTP method, URI, body or
query string).
4. SQL code that is likely to be malicious. Attackers try to extract data from your
database by embedding malicious SQL code in a web request; this is known as SQL
injection.
5. Strings that appear in the request(Header, HTTP method, URI, body or query
string), for example, values that appear in the User-Agent header or text strings
that appear in the query string.
Some conditions take multiple values. For example, you can specify up to 1000 IP
addresses or IP address ranges in an IP condition.
Rules
You combine conditions into rules to precisely target the requests that you
want to allow or block.
When a rule includes multiple conditions, AWS WAF looks for requests that
match all those conditions — it ANDs the conditions together.
Web Access Control Lists (ACLs)
Finally, you combine rules into a Web ACL. This is where you define an action
for each rule—allow, block, or count—and a default action. A Web ACL is also
associated to a CloudFront resource. This allows you to have a set of rules and
actions for multiple web sites.
When a web request matches all of the conditions in a rule, AWS WAF can
either allow the request to be forwarded to CloudFront or block the request.
For testing purposes, you can instruct WAF to count the requests and evaluate
their behaviour later. You specify the action that you want AWS WAF to
perform for each rule.
At simplest level, AWS WAF let you choose one of the following behaviour:
1. Allow all requests except the ones that you specify – This is useful when you want
CloudFront to serve content for a public website but you also want to block requests
from attackers.
2. Block all requests except the ones that you specify – This is useful when you want
CloudFront to serve content for a restricted website whose users are readily identifiable
by properties in web requests, such as the IP addresses they use to browse to the
website.
3. Count the requests that match the properties that you specify – When you want to allow
or block requests based on new properties in web requests, you can first configure AWS
WAF to count the requests that match those properties without allowing or blocking
those requests. This lets you confirm that you didn’t accidentally configure AWS WAF to
block all of the traffic to your website. When you’re confident that you specified the
correct properties, you can change the behaviour to allow or block requests.
Full Feature API
Combining the core WAF Web Traffic Filtering features with some of the AWS
services you can make the rules dynamic. For example, it is possible to
temporarily block IP Addresses based off request volume – shutting down
bots or screen scraping processes.
There are several CloudFormation templates that can jump-start setting up
some of these dynamic rules.
You can view the AWF pricing list and limits on entities here and here.
Thank you...

More Related Content

Viewers also liked

Guía rápida Portal PESCA
Guía rápida Portal PESCAGuía rápida Portal PESCA
Guía rápida Portal PESCAjohnny.lake
 
you are beter off united
you are beter off unitedyou are beter off united
you are beter off unitedardenmanchip
 
Railway reservation system
Railway reservation systemRailway reservation system
Railway reservation systemAbhishek Yadav
 
¿Por qué laminar?
¿Por qué laminar?¿Por qué laminar?
¿Por qué laminar?Emaser
 
Inkjet: A Driver For Change In The Coatings Industry
Inkjet:  A Driver For Change In The Coatings IndustryInkjet:  A Driver For Change In The Coatings Industry
Inkjet: A Driver For Change In The Coatings IndustryXennia Technology
 
Enhanced Functionality On Plastic Using Inkjet Technology
Enhanced Functionality On Plastic Using Inkjet TechnologyEnhanced Functionality On Plastic Using Inkjet Technology
Enhanced Functionality On Plastic Using Inkjet TechnologyXennia Technology
 
Las redes sociales como herramienta de promocion del paisaje turistico
Las redes sociales como herramienta de promocion del paisaje turisticoLas redes sociales como herramienta de promocion del paisaje turistico
Las redes sociales como herramienta de promocion del paisaje turisticoValència Turisme
 
Nghiên cứu một số biện pháp kỹ thuật phát triển hoa cúc tại thành phố thái ng...
Nghiên cứu một số biện pháp kỹ thuật phát triển hoa cúc tại thành phố thái ng...Nghiên cứu một số biện pháp kỹ thuật phát triển hoa cúc tại thành phố thái ng...
Nghiên cứu một số biện pháp kỹ thuật phát triển hoa cúc tại thành phố thái ng...https://www.facebook.com/garmentspace
 
T7 timeless present tense jf
T7  timeless present tense jfT7  timeless present tense jf
T7 timeless present tense jfmecteam7
 
Orit Innovations & Suggestions
Orit Innovations & SuggestionsOrit Innovations & Suggestions
Orit Innovations & SuggestionsDilshan Bandara
 
Catalogo emasolv
Catalogo emasolvCatalogo emasolv
Catalogo emasolvEmaser
 
Illuminated Manuscripts by TJ Ryan
Illuminated Manuscripts by TJ RyanIlluminated Manuscripts by TJ Ryan
Illuminated Manuscripts by TJ RyanTeejRyan
 
Inkjet Printing For Advanced Functional Coatings
Inkjet Printing For Advanced Functional CoatingsInkjet Printing For Advanced Functional Coatings
Inkjet Printing For Advanced Functional CoatingsXennia Technology
 
Quality improvement programme launch event slides
Quality improvement programme   launch event slidesQuality improvement programme   launch event slides
Quality improvement programme launch event slidesELFT_QI
 

Viewers also liked (16)

Dipecho broucher
Dipecho broucherDipecho broucher
Dipecho broucher
 
Guía rápida Portal PESCA
Guía rápida Portal PESCAGuía rápida Portal PESCA
Guía rápida Portal PESCA
 
you are beter off united
you are beter off unitedyou are beter off united
you are beter off united
 
Railway reservation system
Railway reservation systemRailway reservation system
Railway reservation system
 
¿Por qué laminar?
¿Por qué laminar?¿Por qué laminar?
¿Por qué laminar?
 
Inkjet: A Driver For Change In The Coatings Industry
Inkjet:  A Driver For Change In The Coatings IndustryInkjet:  A Driver For Change In The Coatings Industry
Inkjet: A Driver For Change In The Coatings Industry
 
Enhanced Functionality On Plastic Using Inkjet Technology
Enhanced Functionality On Plastic Using Inkjet TechnologyEnhanced Functionality On Plastic Using Inkjet Technology
Enhanced Functionality On Plastic Using Inkjet Technology
 
Las redes sociales como herramienta de promocion del paisaje turistico
Las redes sociales como herramienta de promocion del paisaje turisticoLas redes sociales como herramienta de promocion del paisaje turistico
Las redes sociales como herramienta de promocion del paisaje turistico
 
Nghiên cứu một số biện pháp kỹ thuật phát triển hoa cúc tại thành phố thái ng...
Nghiên cứu một số biện pháp kỹ thuật phát triển hoa cúc tại thành phố thái ng...Nghiên cứu một số biện pháp kỹ thuật phát triển hoa cúc tại thành phố thái ng...
Nghiên cứu một số biện pháp kỹ thuật phát triển hoa cúc tại thành phố thái ng...
 
T7 timeless present tense jf
T7  timeless present tense jfT7  timeless present tense jf
T7 timeless present tense jf
 
Orit Innovations & Suggestions
Orit Innovations & SuggestionsOrit Innovations & Suggestions
Orit Innovations & Suggestions
 
Catalogo emasolv
Catalogo emasolvCatalogo emasolv
Catalogo emasolv
 
Illuminated Manuscripts by TJ Ryan
Illuminated Manuscripts by TJ RyanIlluminated Manuscripts by TJ Ryan
Illuminated Manuscripts by TJ Ryan
 
Inkjet Printing For Advanced Functional Coatings
Inkjet Printing For Advanced Functional CoatingsInkjet Printing For Advanced Functional Coatings
Inkjet Printing For Advanced Functional Coatings
 
Quality improvement programme launch event slides
Quality improvement programme   launch event slidesQuality improvement programme   launch event slides
Quality improvement programme launch event slides
 
Mahwu dan itsbath
Mahwu dan itsbathMahwu dan itsbath
Mahwu dan itsbath
 

Recently uploaded

SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?Alexandre Beguel
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfRTS corp
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolsosttopstonverter
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profileakrivarotava
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingShane Coughlan
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITmanoharjgpsolutions
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxRTS corp
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesVictoriaMetrics
 

Recently uploaded (20)

SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration tools
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profile
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh IT
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 Updates
 

AWS WAF – How to protect your site from DDoS

  • 1. AWS WAF How to protect your site from DDoS
  • 2. Web attacks like SQL injection and Cross-Site Scripting can be devastating, resulting in massive data breaches, customer turnover, notification costs, lawsuits, and fines. AWS WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded to Amazon CloudFront and lets you control access to your content. Based on conditions that you specify, such as the IP addresses that requests originate from, or the values of query strings, CloudFront responds to requests either with the requested content or with an HTTP 403 status code (Forbidden). You can also configure CloudFront to return a custom error page when a request is blocked
  • 3.
  • 4. The first illustration shows an infrastructure trying to respond to all requests, an approach that exhausts the web server’s resources. The second illustration shows a resilient infrastructure that uses AWS WAF, which blocks requests originating from blacklisted sources.
  • 5. AWS WAF is a relatively new service only recently brought out of Beta. This service is tightly coupled to the CloudFront CDN service. The WAF service reviews traffic that is passing through the CDN and, based off defined rules, tells the CDN to either block or allow the traffic. To use this service, all site traffic must pass through a CloudFront CDN. AWS WAF helps in preventing from a lot of attacks, but DDoS is the most common form of attack and also the most difficult to curb, let us start with what exactly is a DDoS attack.
  • 6. DDoS Attacks A Denial of Service (DoS) attack is an attack that can make your website or application unavailable to end users. To achieve this, attackers use a variety of techniques that consume network or other resources, disrupting access for legitimate end users.
  • 7. Diagram of a DOS attack In its simplest form, a DoS attack against a target is executed by a lone attacker from a single source, as shown below:
  • 8. In the case of a Distributed Denial of Service (DDoS) attack, an attacker uses multiple sources—which may be compromised or controlled by a group of collaborators—to orchestrate an attack against a target. As illustrated below, in a DDoS attack, each of the collaborators or compromised hosts participates in the attack, generating a flood of packets or requests to overwhelm the intended target.
  • 9. Diagram of a DDOS attack
  • 10. DDoS attacks are most common at layers 3, 4, 6, and 7 of the Open Systems Interconnection (OSI) model, which is described in the above table. Layer 3 and 4 attacks correspond to the Network and Transport layers of the OSI model. This distinction is important because the attack types directed at these layers are different and so different techniques are used to build resiliency.
  • 11. Architecture Implications WAF can be implemented as a CloudFormation stack as illustrated in the image below:
  • 12. The CloudFormation stack works as follows: 1. All web requests are passed through a CloudFront CDN network. All request data is persisted to log files that reside on S3 buckets. 2. For every new request log file that is persisted, a Lambda function is triggered to analyse the log file data. The Lambda function reviews the traffic patterns and then updates the WAF block list based off defined rules. 3. The WAF device blocks entry to the Elastic Load Balancer based off the source IP address.
  • 13. Features - Web Traffic Filtering Traffic filtering is accomplished by creating specific web request conditions, which are then grouped into rules. These rules are then associated with a CloudFront distribution through a web access control list.
  • 14. Condition - Define the basic characteristics that you want AWS WAF to watch for in web requests. 1. Scripts that are likely to be malicious. Attackers embed scripts that can exploit vulnerabilities in web applications; this is known as cross-site scripting. 2. The IP addresses or address ranges that requests originate from. 3. The length of specified parts of the request (Header, HTTP method, URI, body or query string). 4. SQL code that is likely to be malicious. Attackers try to extract data from your database by embedding malicious SQL code in a web request; this is known as SQL injection. 5. Strings that appear in the request(Header, HTTP method, URI, body or query string), for example, values that appear in the User-Agent header or text strings that appear in the query string. Some conditions take multiple values. For example, you can specify up to 1000 IP addresses or IP address ranges in an IP condition.
  • 15. Rules You combine conditions into rules to precisely target the requests that you want to allow or block. When a rule includes multiple conditions, AWS WAF looks for requests that match all those conditions — it ANDs the conditions together.
  • 16. Web Access Control Lists (ACLs) Finally, you combine rules into a Web ACL. This is where you define an action for each rule—allow, block, or count—and a default action. A Web ACL is also associated to a CloudFront resource. This allows you to have a set of rules and actions for multiple web sites. When a web request matches all of the conditions in a rule, AWS WAF can either allow the request to be forwarded to CloudFront or block the request. For testing purposes, you can instruct WAF to count the requests and evaluate their behaviour later. You specify the action that you want AWS WAF to perform for each rule.
  • 17. At simplest level, AWS WAF let you choose one of the following behaviour: 1. Allow all requests except the ones that you specify – This is useful when you want CloudFront to serve content for a public website but you also want to block requests from attackers. 2. Block all requests except the ones that you specify – This is useful when you want CloudFront to serve content for a restricted website whose users are readily identifiable by properties in web requests, such as the IP addresses they use to browse to the website. 3. Count the requests that match the properties that you specify – When you want to allow or block requests based on new properties in web requests, you can first configure AWS WAF to count the requests that match those properties without allowing or blocking those requests. This lets you confirm that you didn’t accidentally configure AWS WAF to block all of the traffic to your website. When you’re confident that you specified the correct properties, you can change the behaviour to allow or block requests.
  • 18. Full Feature API Combining the core WAF Web Traffic Filtering features with some of the AWS services you can make the rules dynamic. For example, it is possible to temporarily block IP Addresses based off request volume – shutting down bots or screen scraping processes. There are several CloudFormation templates that can jump-start setting up some of these dynamic rules. You can view the AWF pricing list and limits on entities here and here.