SlideShare uma empresa Scribd logo
1 de 38
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Advanced techniques for securing web
applications
Sundar Jayashekar, Sr. Product Manager
(Perimeter Protection: AWS WAF, AWS Shield)
March, 2018
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What to expect from this session
1. Biggest Threats today
2. AWS WAF Introduction
3. What customer like
4. Recent Launches
5. Popular deployment models
6. Demo
7. Customer references
8. Q&A
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Biggest Threats to Applications today
Application
Layer
HTTP floods
Abusive users
Content scrapers
Scanners & probes
CrawlersSQL injection
XSS
Application exploits
DDoS OWASP Top 10 Bad Bots
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What is a WAF?
Web Application Firewall –
Monitors HTTP/S requests and protects
web applications from malicious
activities
Layer 7 inspection and mitigation tool
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What can we do with an AWS WAF?
• Rate based rules
• IP Match & Geo-IP filters
• Regex & String Match
• Size constraints
• Action: Allow/Block
• CloudWatch
Metrics/Alarms
• Sampled Logs
• Count Action mode
• SQLi
• XSS
• IP Blacklists
1. Malicious traffic
blocking
2. Web traffic filtering 3. Active monitoring
& tuning
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS WAF available on
Amazon CloudFront
(Amazon’s CDN)
Application Load Balancer
(ALB)
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What do customers like about AWS WAF?
2. Fast Incidence
Response
1. Easy to deploy 3. Affordable
4. Full API Support 5. Managed Service
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
How are Customers using AWS WAF?
1. Custom Rules 3. Security Automation2. Managed Rules
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
We listen to our customers and iterate quickly
In the last 6 months we have added …
1. Rate Based Rules
2. OWASP Top 10 templates
3. Geo IP based restriction
4. RegEx Support
5. Managed Rules
6. Additional Regions for WAF/Shield
7. More Rule Products for Managed Rules
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Biggest Threats to Applications today
Application
Layer
3. Bad Bots1. DDoS 2. OWASP Top 10
HTTP floods
Abusive users
Content scrapers
Scanners & probes
CrawlersSQL injection
XSS
Application exploits
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Demo
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
WAF concepts for the demo …
1. Web Access Control Lists (WebACL)
2. Rules: Precedence / Rule / Action
3. Conditions:
• IP Match
• String Match
• SQLi, XSS Match
• Geo-IP
• Size Constraints etc
4. AWS Resource: CloudFront, ALB (more coming soon …)
5. Reporting: Real Time Metrics, Sampled Web Requests
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Bad bots
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Bad Bot Protections
1. Managed Rules from Fortinet or F5
2. Honey Pot URL (via Security Automations)
3. Managed Rules + Honey Pot
4. Managed Rules + Honey Pot + IP Reputational lists
5. Managed Rules + Honey Pot + Suspicious user-agents
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Bots and scrapers
bad bot
scraper protection
Amazon
CloudFront
AWS Lambda
Access Handler
AWS WAF
b
c
d
web application
resources
<a href="/v1/name/" style="display: none"
aria-hidden="true">honeypot link</a>
a
Honey Pot URL technique
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
DoS / DDoS / Abusive-users
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
DoS/DDoS: Rate Based Rules (RBR)
1. Block DoS from a IP
2. Block DoS from an IP with an user-agent
3. Set different Rates for different Geolocations
4. Brute Force on Login or Admin page
 Credential Stuffing
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
OWASP Top 10 Protections
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
OWASP Top 10 Protection
1. AWS OWASP Whitepaper with Rules
2. Managed Rules
3. Managed Rules + Augment with custom rules
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Managed Rules from Top Security vendors
Amazon Confidential
https://aws.amazon.com/mp/security/WAFManagedRules/
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS WAF Managed Rules available today
1. Alert Logic Managed Rules for AWS WAF - OWASP Top 10 for WordPress
2. F5 Bot Detection Signatures For AWS WAF
3. F5 Web Application CVE Signatures For AWS WAF
4. F5 - Web Exploits Rules for AWS WAF
5. Fortinet Managed Rules for AWS WAF - Malicious Bots
6. Fortinet Managed Rules for AWS WAF - SQLi/XSS
7. Fortinet Managed Rules for AWS WAF - General and Known Exploits
8. Fortinet Managed Rules for AWS WAF - Complete OWASP Top 10
9. Imperva’s Managed Rules for WordPress Protection
10. Imperva - Managed Rules for IP Reputation on AWS WAF
11. Trend Micro Managed Rules for AWS WAF - Webserver (Apache, Nginx)
12. Trend Micro Managed Rules for AWS WAF - Content Management System (CMS)
13. Trustwave Managed Rules for AWS WAF - ModSecurity Virtual Patching
14. Trustwave Managed Rules for AWS WAF - CMS Virtual Patches
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Key Benefits of Managed Rules
 Rules managed by security experts
 Choice of protections
 Auto-updates
 Pay as you go
 Easy to Deploy
Amazon Confidential
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Deploy in 3 easy steps
Find rules on AWS WAF
console or AWS
marketplace
Click and
subscribe
Associate rules in
AWS WAF
Amazon Confidential
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Positive and Negative
Security Models
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Example: Whitelisting good users
Verify that a valid referrer is present
Host: www.example.com
User-Agent: Mozilla/5.0 (Macintosh; …
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referrer: http://www.example.com/
Connection: keep-alive
AWS
WAF
RAW request headers
CloudFront
Check: Header “Referrer”
Match Type: Contains
Match: “example.com”
Action: ALLOW
Rule
String match condition
Good users
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Example: Blacklisting bad bots
Block unwanted user agent headers and use transforms to stop evasion:
Host: www.example.com
User-Agent: bAdBoT
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referrer: http://www.InTeRnEtkItTiEs.com/
Connection: keep-alive
AWS
WAF
RAW request headers
CloudFront
Check: Header “User-Agent”
Transform: To lower
Match Type: Contains
Match: “badbot”
Action: BLOCK
Rule
String match condition
Scraper bot
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Visibility, Dashboards and Alarms
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Visibility and Dashboard
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Sampled Requests (logs)
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Metrics and Alarms (CloudWatch Alarms)
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
SIEM | SOC Integrations
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Incident Reports and SOC workflows
CloudWatch
Alarm
SNS
Topic
AWS Lambda
AWS WAF
Operator
SES
Topic
1. Alarm on count 2. Send
Amazon SNS
notification
4. Format
sampled requests
5. Get
sampled requests
6. Send email
notification
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Customers using AWS WAF (referenceable)
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS WAF customers
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
“AWS WAF has been a huge success for our business..
Having literally no website downtime has saved us hundreds
of thousands of dollars”
Customer References (AWS WAF)
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
TriNimbus Blog (a customer story)
Testament to: We have come along way …
http://www.trinimbus.com/blog/revisiting-amazon-web-services-web-application-firewall-aws-waf/
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
“[AWS WAF] is a fantastic new service that you should be looking to add
to your deployment asap.” – Mark Nunnikhoven (Vice President, Cloud Research), Trend Micro
What are people saying about AWS WAF?
“Protecting our open sites and even API's is of course great in protecting and
blocking attacks, however what it does more is a dramatically improvement to the
reliability of our monitoring and alert systems. The attacks and hacking efforts are creating noise in our
system that often leads to false positives. Integrating WAF allows us to focus on the real issues.– Roi
Ginat (Co-founder), Glide Talk
“With AWS WAF we have been able to completely hand these
[traffic] concerns to Amazon. When we detect anomalies in our traffic we can
protect our quality of service by blocking this traffic at the edge nodes across the world. This traffic no
longer touches our infrastructure at all and is handled by CloudFront near the point that the traffic is
generated.”– Robert Isaacs (Co-founder), Chief Software Architect, ConnectWise
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Questions?

Mais conteúdo relacionado

Mais procurados

AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your CloudAWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your CloudAmazon Web Services
 
Protect Your Web Applications from Common Attack Vectors Using AWS WAF - SID3...
Protect Your Web Applications from Common Attack Vectors Using AWS WAF - SID3...Protect Your Web Applications from Common Attack Vectors Using AWS WAF - SID3...
Protect Your Web Applications from Common Attack Vectors Using AWS WAF - SID3...Amazon Web Services
 
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Amazon Web Services
 
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Amazon Web Services
 
Using Access Advisor to Strike the Balance Between Security and Usability - S...
Using Access Advisor to Strike the Balance Between Security and Usability - S...Using Access Advisor to Strike the Balance Between Security and Usability - S...
Using Access Advisor to Strike the Balance Between Security and Usability - S...Amazon Web Services
 
NEW LAUNCH! Introduction to Managed Rules for AWS WAF - SID217 - re:Invent 2017
NEW LAUNCH! Introduction to Managed Rules for AWS WAF - SID217 - re:Invent 2017NEW LAUNCH! Introduction to Managed Rules for AWS WAF - SID217 - re:Invent 2017
NEW LAUNCH! Introduction to Managed Rules for AWS WAF - SID217 - re:Invent 2017Amazon Web Services
 
NEW LAUNCH! Amazon Neptune Overview and Customer Use Cases - DAT319 - re:Inve...
NEW LAUNCH! Amazon Neptune Overview and Customer Use Cases - DAT319 - re:Inve...NEW LAUNCH! Amazon Neptune Overview and Customer Use Cases - DAT319 - re:Inve...
NEW LAUNCH! Amazon Neptune Overview and Customer Use Cases - DAT319 - re:Inve...Amazon Web Services
 
Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...
Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...
Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...Amazon Web Services
 
From Obstacle to Advantage: The Changing Role of Security & Compliance in You...
From Obstacle to Advantage: The Changing Role of Security & Compliance in You...From Obstacle to Advantage: The Changing Role of Security & Compliance in You...
From Obstacle to Advantage: The Changing Role of Security & Compliance in You...Amazon Web Services
 
The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...
The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...
The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...Amazon Web Services
 
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...Amazon Web Services
 
Centrally Protect Your AWS Resources with Amazon GuardDuty - AWS Online Tech ...
Centrally Protect Your AWS Resources with Amazon GuardDuty - AWS Online Tech ...Centrally Protect Your AWS Resources with Amazon GuardDuty - AWS Online Tech ...
Centrally Protect Your AWS Resources with Amazon GuardDuty - AWS Online Tech ...Amazon Web Services
 
The AWS Philosophy of Security - SID322 - re:Invent 2017
The AWS Philosophy of Security - SID322 - re:Invent 2017The AWS Philosophy of Security - SID322 - re:Invent 2017
The AWS Philosophy of Security - SID322 - re:Invent 2017Amazon Web Services
 
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...Amazon Web Services
 
Cloud Native DDoS Attack Mitigation
Cloud Native DDoS Attack MitigationCloud Native DDoS Attack Mitigation
Cloud Native DDoS Attack MitigationAmazon Web Services
 
Moving from the Shadows to the Throne - SID310 - re:Invent 2017
Moving from the Shadows to the Throne - SID310 - re:Invent 2017Moving from the Shadows to the Throne - SID310 - re:Invent 2017
Moving from the Shadows to the Throne - SID310 - re:Invent 2017Amazon Web Services
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...Amazon Web Services
 
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...Amazon Web Services
 

Mais procurados (20)

AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your CloudAWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
 
Protect Your Web Applications from Common Attack Vectors Using AWS WAF - SID3...
Protect Your Web Applications from Common Attack Vectors Using AWS WAF - SID3...Protect Your Web Applications from Common Attack Vectors Using AWS WAF - SID3...
Protect Your Web Applications from Common Attack Vectors Using AWS WAF - SID3...
 
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
 
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
 
Using Access Advisor to Strike the Balance Between Security and Usability - S...
Using Access Advisor to Strike the Balance Between Security and Usability - S...Using Access Advisor to Strike the Balance Between Security and Usability - S...
Using Access Advisor to Strike the Balance Between Security and Usability - S...
 
NEW LAUNCH! Introduction to Managed Rules for AWS WAF - SID217 - re:Invent 2017
NEW LAUNCH! Introduction to Managed Rules for AWS WAF - SID217 - re:Invent 2017NEW LAUNCH! Introduction to Managed Rules for AWS WAF - SID217 - re:Invent 2017
NEW LAUNCH! Introduction to Managed Rules for AWS WAF - SID217 - re:Invent 2017
 
NEW LAUNCH! Amazon Neptune Overview and Customer Use Cases - DAT319 - re:Inve...
NEW LAUNCH! Amazon Neptune Overview and Customer Use Cases - DAT319 - re:Inve...NEW LAUNCH! Amazon Neptune Overview and Customer Use Cases - DAT319 - re:Inve...
NEW LAUNCH! Amazon Neptune Overview and Customer Use Cases - DAT319 - re:Inve...
 
Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...
Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...
Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...
 
From Obstacle to Advantage: The Changing Role of Security & Compliance in You...
From Obstacle to Advantage: The Changing Role of Security & Compliance in You...From Obstacle to Advantage: The Changing Role of Security & Compliance in You...
From Obstacle to Advantage: The Changing Role of Security & Compliance in You...
 
The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...
The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...
The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...
 
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
 
Centrally Protect Your AWS Resources with Amazon GuardDuty - AWS Online Tech ...
Centrally Protect Your AWS Resources with Amazon GuardDuty - AWS Online Tech ...Centrally Protect Your AWS Resources with Amazon GuardDuty - AWS Online Tech ...
Centrally Protect Your AWS Resources with Amazon GuardDuty - AWS Online Tech ...
 
Tape Replacement
Tape ReplacementTape Replacement
Tape Replacement
 
The AWS Philosophy of Security - SID322 - re:Invent 2017
The AWS Philosophy of Security - SID322 - re:Invent 2017The AWS Philosophy of Security - SID322 - re:Invent 2017
The AWS Philosophy of Security - SID322 - re:Invent 2017
 
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...
 
Cloud Native DDoS Attack Mitigation
Cloud Native DDoS Attack MitigationCloud Native DDoS Attack Mitigation
Cloud Native DDoS Attack Mitigation
 
Moving from the Shadows to the Throne - SID310 - re:Invent 2017
Moving from the Shadows to the Throne - SID310 - re:Invent 2017Moving from the Shadows to the Throne - SID310 - re:Invent 2017
Moving from the Shadows to the Throne - SID310 - re:Invent 2017
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
 
AWS WAF
AWS WAFAWS WAF
AWS WAF
 
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
 

Semelhante a Advanced Techniques for Securing Web Applications

A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...Amazon Web Services
 
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...Amazon Web Services
 
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útokyAWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útokyVladimir Simek
 
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...Amazon Web Services
 
Edge immersion days module 2 - protect your application at the edge using a...
Edge immersion days   module 2 - protect your application at the edge using a...Edge immersion days   module 2 - protect your application at the edge using a...
Edge immersion days module 2 - protect your application at the edge using a...RoiElbaz1
 
AWS reInvent 2017 recap - Managed Rules on AWS WAF
AWS reInvent 2017 recap - Managed Rules on AWS WAFAWS reInvent 2017 recap - Managed Rules on AWS WAF
AWS reInvent 2017 recap - Managed Rules on AWS WAFAmazon Web Services
 
Protect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced AttacksProtect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced AttacksAmazon Web Services
 
Introducing AWS Firewall Manager - AWS Online Tech Talks
Introducing AWS Firewall Manager - AWS Online Tech TalksIntroducing AWS Firewall Manager - AWS Online Tech Talks
Introducing AWS Firewall Manager - AWS Online Tech TalksAmazon Web Services
 
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsLock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsAmazon Web Services
 
Security Framework Shakedown: Chart Your Journey with AWS Best Practices
Security Framework Shakedown: Chart Your Journey with AWS Best PracticesSecurity Framework Shakedown: Chart Your Journey with AWS Best Practices
Security Framework Shakedown: Chart Your Journey with AWS Best PracticesAmazon Web Services
 
Compliance and Security Mitigation Techniques
Compliance and Security Mitigation TechniquesCompliance and Security Mitigation Techniques
Compliance and Security Mitigation TechniquesAmazon Web Services
 
[NEW LAUNCH!] Introducing AWS App Mesh – service mesh on AWS (CON367) - AWS r...
[NEW LAUNCH!] Introducing AWS App Mesh – service mesh on AWS (CON367) - AWS r...[NEW LAUNCH!] Introducing AWS App Mesh – service mesh on AWS (CON367) - AWS r...
[NEW LAUNCH!] Introducing AWS App Mesh – service mesh on AWS (CON367) - AWS r...Amazon Web Services
 
Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...Amazon Web Services
 
Introducing Managed Rules for AWS WAF (with a Customer Story) - AWS Online Te...
Introducing Managed Rules for AWS WAF (with a Customer Story) - AWS Online Te...Introducing Managed Rules for AWS WAF (with a Customer Story) - AWS Online Te...
Introducing Managed Rules for AWS WAF (with a Customer Story) - AWS Online Te...Amazon Web Services
 
AWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAmazon Web Services
 
Automating DDoS and WAF Response
Automating DDoS and WAF ResponseAutomating DDoS and WAF Response
Automating DDoS and WAF ResponseAmazon Web Services
 
Developing on AWS - Crypto Startup
Developing on AWS - Crypto StartupDeveloping on AWS - Crypto Startup
Developing on AWS - Crypto StartupAmazon Web Services
 
Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...
Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...
Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...Amazon Web Services
 

Semelhante a Advanced Techniques for Securing Web Applications (20)

A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
 
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
 
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útokyAWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
 
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
 
Edge immersion days module 2 - protect your application at the edge using a...
Edge immersion days   module 2 - protect your application at the edge using a...Edge immersion days   module 2 - protect your application at the edge using a...
Edge immersion days module 2 - protect your application at the edge using a...
 
AWS reInvent 2017 recap - Managed Rules on AWS WAF
AWS reInvent 2017 recap - Managed Rules on AWS WAFAWS reInvent 2017 recap - Managed Rules on AWS WAF
AWS reInvent 2017 recap - Managed Rules on AWS WAF
 
Protect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced AttacksProtect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced Attacks
 
Introducing AWS Firewall Manager - AWS Online Tech Talks
Introducing AWS Firewall Manager - AWS Online Tech TalksIntroducing AWS Firewall Manager - AWS Online Tech Talks
Introducing AWS Firewall Manager - AWS Online Tech Talks
 
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsLock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
 
Security Framework Shakedown: Chart Your Journey with AWS Best Practices
Security Framework Shakedown: Chart Your Journey with AWS Best PracticesSecurity Framework Shakedown: Chart Your Journey with AWS Best Practices
Security Framework Shakedown: Chart Your Journey with AWS Best Practices
 
Mitigating techniques
Mitigating techniquesMitigating techniques
Mitigating techniques
 
Compliance and Security Mitigation Techniques
Compliance and Security Mitigation TechniquesCompliance and Security Mitigation Techniques
Compliance and Security Mitigation Techniques
 
Security Framework Shakedown
Security Framework ShakedownSecurity Framework Shakedown
Security Framework Shakedown
 
[NEW LAUNCH!] Introducing AWS App Mesh – service mesh on AWS (CON367) - AWS r...
[NEW LAUNCH!] Introducing AWS App Mesh – service mesh on AWS (CON367) - AWS r...[NEW LAUNCH!] Introducing AWS App Mesh – service mesh on AWS (CON367) - AWS r...
[NEW LAUNCH!] Introducing AWS App Mesh – service mesh on AWS (CON367) - AWS r...
 
Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...
 
Introducing Managed Rules for AWS WAF (with a Customer Story) - AWS Online Te...
Introducing Managed Rules for AWS WAF (with a Customer Story) - AWS Online Te...Introducing Managed Rules for AWS WAF (with a Customer Story) - AWS Online Te...
Introducing Managed Rules for AWS WAF (with a Customer Story) - AWS Online Te...
 
AWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & Remediation
 
Automating DDoS and WAF Response
Automating DDoS and WAF ResponseAutomating DDoS and WAF Response
Automating DDoS and WAF Response
 
Developing on AWS - Crypto Startup
Developing on AWS - Crypto StartupDeveloping on AWS - Crypto Startup
Developing on AWS - Crypto Startup
 
Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...
Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...
Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...
 

Mais de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mais de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Advanced Techniques for Securing Web Applications

  • 1. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Advanced techniques for securing web applications Sundar Jayashekar, Sr. Product Manager (Perimeter Protection: AWS WAF, AWS Shield) March, 2018
  • 2. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What to expect from this session 1. Biggest Threats today 2. AWS WAF Introduction 3. What customer like 4. Recent Launches 5. Popular deployment models 6. Demo 7. Customer references 8. Q&A
  • 3. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Biggest Threats to Applications today Application Layer HTTP floods Abusive users Content scrapers Scanners & probes CrawlersSQL injection XSS Application exploits DDoS OWASP Top 10 Bad Bots
  • 4. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What is a WAF? Web Application Firewall – Monitors HTTP/S requests and protects web applications from malicious activities Layer 7 inspection and mitigation tool
  • 5. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What can we do with an AWS WAF? • Rate based rules • IP Match & Geo-IP filters • Regex & String Match • Size constraints • Action: Allow/Block • CloudWatch Metrics/Alarms • Sampled Logs • Count Action mode • SQLi • XSS • IP Blacklists 1. Malicious traffic blocking 2. Web traffic filtering 3. Active monitoring & tuning
  • 6. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS WAF available on Amazon CloudFront (Amazon’s CDN) Application Load Balancer (ALB)
  • 7. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What do customers like about AWS WAF? 2. Fast Incidence Response 1. Easy to deploy 3. Affordable 4. Full API Support 5. Managed Service
  • 8. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. How are Customers using AWS WAF? 1. Custom Rules 3. Security Automation2. Managed Rules
  • 9. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. We listen to our customers and iterate quickly In the last 6 months we have added … 1. Rate Based Rules 2. OWASP Top 10 templates 3. Geo IP based restriction 4. RegEx Support 5. Managed Rules 6. Additional Regions for WAF/Shield 7. More Rule Products for Managed Rules
  • 10. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Biggest Threats to Applications today Application Layer 3. Bad Bots1. DDoS 2. OWASP Top 10 HTTP floods Abusive users Content scrapers Scanners & probes CrawlersSQL injection XSS Application exploits
  • 11. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Demo
  • 12. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. WAF concepts for the demo … 1. Web Access Control Lists (WebACL) 2. Rules: Precedence / Rule / Action 3. Conditions: • IP Match • String Match • SQLi, XSS Match • Geo-IP • Size Constraints etc 4. AWS Resource: CloudFront, ALB (more coming soon …) 5. Reporting: Real Time Metrics, Sampled Web Requests
  • 13. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Bad bots
  • 14. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Bad Bot Protections 1. Managed Rules from Fortinet or F5 2. Honey Pot URL (via Security Automations) 3. Managed Rules + Honey Pot 4. Managed Rules + Honey Pot + IP Reputational lists 5. Managed Rules + Honey Pot + Suspicious user-agents
  • 15. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Bots and scrapers bad bot scraper protection Amazon CloudFront AWS Lambda Access Handler AWS WAF b c d web application resources <a href="/v1/name/" style="display: none" aria-hidden="true">honeypot link</a> a Honey Pot URL technique
  • 16. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. DoS / DDoS / Abusive-users
  • 17. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. DoS/DDoS: Rate Based Rules (RBR) 1. Block DoS from a IP 2. Block DoS from an IP with an user-agent 3. Set different Rates for different Geolocations 4. Brute Force on Login or Admin page  Credential Stuffing
  • 18. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. OWASP Top 10 Protections
  • 19. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. OWASP Top 10 Protection 1. AWS OWASP Whitepaper with Rules 2. Managed Rules 3. Managed Rules + Augment with custom rules
  • 20. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Managed Rules from Top Security vendors Amazon Confidential https://aws.amazon.com/mp/security/WAFManagedRules/
  • 21. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS WAF Managed Rules available today 1. Alert Logic Managed Rules for AWS WAF - OWASP Top 10 for WordPress 2. F5 Bot Detection Signatures For AWS WAF 3. F5 Web Application CVE Signatures For AWS WAF 4. F5 - Web Exploits Rules for AWS WAF 5. Fortinet Managed Rules for AWS WAF - Malicious Bots 6. Fortinet Managed Rules for AWS WAF - SQLi/XSS 7. Fortinet Managed Rules for AWS WAF - General and Known Exploits 8. Fortinet Managed Rules for AWS WAF - Complete OWASP Top 10 9. Imperva’s Managed Rules for WordPress Protection 10. Imperva - Managed Rules for IP Reputation on AWS WAF 11. Trend Micro Managed Rules for AWS WAF - Webserver (Apache, Nginx) 12. Trend Micro Managed Rules for AWS WAF - Content Management System (CMS) 13. Trustwave Managed Rules for AWS WAF - ModSecurity Virtual Patching 14. Trustwave Managed Rules for AWS WAF - CMS Virtual Patches
  • 22. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Key Benefits of Managed Rules  Rules managed by security experts  Choice of protections  Auto-updates  Pay as you go  Easy to Deploy Amazon Confidential
  • 23. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Deploy in 3 easy steps Find rules on AWS WAF console or AWS marketplace Click and subscribe Associate rules in AWS WAF Amazon Confidential
  • 24. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Positive and Negative Security Models
  • 25. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Example: Whitelisting good users Verify that a valid referrer is present Host: www.example.com User-Agent: Mozilla/5.0 (Macintosh; … Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referrer: http://www.example.com/ Connection: keep-alive AWS WAF RAW request headers CloudFront Check: Header “Referrer” Match Type: Contains Match: “example.com” Action: ALLOW Rule String match condition Good users
  • 26. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Example: Blacklisting bad bots Block unwanted user agent headers and use transforms to stop evasion: Host: www.example.com User-Agent: bAdBoT Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referrer: http://www.InTeRnEtkItTiEs.com/ Connection: keep-alive AWS WAF RAW request headers CloudFront Check: Header “User-Agent” Transform: To lower Match Type: Contains Match: “badbot” Action: BLOCK Rule String match condition Scraper bot
  • 27. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Visibility, Dashboards and Alarms
  • 28. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Visibility and Dashboard
  • 29. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Sampled Requests (logs)
  • 30. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Metrics and Alarms (CloudWatch Alarms)
  • 31. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. SIEM | SOC Integrations
  • 32. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Incident Reports and SOC workflows CloudWatch Alarm SNS Topic AWS Lambda AWS WAF Operator SES Topic 1. Alarm on count 2. Send Amazon SNS notification 4. Format sampled requests 5. Get sampled requests 6. Send email notification
  • 33. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Customers using AWS WAF (referenceable)
  • 34. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS WAF customers
  • 35. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. “AWS WAF has been a huge success for our business.. Having literally no website downtime has saved us hundreds of thousands of dollars” Customer References (AWS WAF)
  • 36. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. TriNimbus Blog (a customer story) Testament to: We have come along way … http://www.trinimbus.com/blog/revisiting-amazon-web-services-web-application-firewall-aws-waf/
  • 37. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. “[AWS WAF] is a fantastic new service that you should be looking to add to your deployment asap.” – Mark Nunnikhoven (Vice President, Cloud Research), Trend Micro What are people saying about AWS WAF? “Protecting our open sites and even API's is of course great in protecting and blocking attacks, however what it does more is a dramatically improvement to the reliability of our monitoring and alert systems. The attacks and hacking efforts are creating noise in our system that often leads to false positives. Integrating WAF allows us to focus on the real issues.– Roi Ginat (Co-founder), Glide Talk “With AWS WAF we have been able to completely hand these [traffic] concerns to Amazon. When we detect anomalies in our traffic we can protect our quality of service by blocking this traffic at the edge nodes across the world. This traffic no longer touches our infrastructure at all and is handled by CloudFront near the point that the traffic is generated.”– Robert Isaacs (Co-founder), Chief Software Architect, ConnectWise
  • 38. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Questions?