SlideShare uma empresa Scribd logo
1 de 33
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Andrew Thomas, GM, AWS Perimeter Protection
March, 2019
AWS Edge Security
Cloud-Native Defense Against Diverse
Internet Threats
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Goal
• Learn about today’s threat landscape and how these
threats can affect your application availability
• Learn how easily using AWS services can give you
baseline protections
• Learn how AWS’s perimeter security services can
provide additional application protections, without the
need to re-architect
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Overview of Threat Landscape
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Typical web applications
Dynamic
applications
Personalized
Content
Static assets
API
Data CenterEnd Users
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Web application design considerations
Data
Center
End Users
Dynamic
applications
Personalized
Content
Static assets
API
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Web application design considerations
Data
Center
End Users
DDoS
Web Exploits
Bots
• Security
• Authentication
• Encryption (TLS)
• Layered Protection
• Availability
• Resiliency/Fault Tolerance
• Request handling capacity
• Blocking bad traffic
• Performance
• Routing
• Throttling
• Alerting & Monitoring
Dynamic
applications
Personalized
Content
Static assets
API
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Types of threats that exist today
SQL Injection
Cross-site Scripting (XSS)
OWASP Top 10
Common Vulnerabilities and
Exposures (CVE)
HTTP Floods
Reflection Attack
Crawlers
Content Scrapers
Scanners & Probes
Denial of Service App Vulnerabilities Bad Bots
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Common DDoS attacks
SYN Flood
UDP Flood
ICMP Flood
Other Reflection Vectors
HTTP Flood
DNS Query Flood
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Building the Baseline Defense
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Building blocks for baseline defense
Amazon VPC Amazon CloudFront Amazon Route 53
Security Groups
Network ACLs
Global Presence
SSL/TLS
Origin Shielding
Resilience (TTL)
DNS Header Validations
Good vs. Bad Resolvers
Priority Based Traffic
Shaping
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Benefits of the AWS Global Edge Network
High Availability Application
Acceleration
AWS Integration Cost Effective
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Leveraging AWS Perimeter
Protection Services
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What else can we do to…
• Defend against DDoS attacks?
• Prevent exploits and bots at application level?
• Manage and apply security policies across multiple
accounts in an organization?
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Four tenets of AWS Shield for DDoS protection
Frictionless setup with minimal
architectural changes
Low Operational Overhead for known and
edge cases
Visibility for dynamic security and compliance
Protection from economic vectors
AWS Shield
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Benefits of AWS Shield Standard and Shield Advanced
Built-in DDoS
Protection for
Everyone
Point and Protect
Wizard
Low Operational Overhead for known and
edge cases
Visibility for dynamic security and compliance
Protection from economic vectors
AWS Shield
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Benefits of AWS Shield Standard and Shield Advanced
Automatic Protection
across customers
Enhanced Protection
baselined to you
24x7 access to
DDoS Response
Team (DRT)
Built-in DDoS
Protection for
Everyone
Point and Protect
Wizard
Visibility for dynamic security and compliance
Protection from economic vectors
AWS Shield
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Benefits of AWS Shield Standard and Shield Advanced
Automatic Protection
across customers
Enhanced Protection
baselined to you
24x7 access to
DDoS Response
Team (DRT)
Built-in DDoS
Protection for
Everyone
Point and Protect
Wizard
Protection from economic vectors
AWS Shield
Cloud-
Watch
Metrics
Attack
Diagnostics
Global Threat
Environment
Dashboard
Quarterly
Security
Review
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Benefits of AWS Shield Standard and Shield Advanced
Automatic Protection
across customers
Enhanced Protection
baselined to you
24x7 access to
DDoS Response
Team (DRT)
Built-in DDoS
Protection for
Everyone
Point and Protect
Wizard
Cloud-
Watch
Metrics
Attack
Diagnostics
Global Threat
Environment
Dashboard
Quarterly
Security
Review
AWS WAF at no
additional cost
For protected resources
AWS Firewall
Manager at no
additional cost
Cost Protection for
scaling
AWS Shield
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Application Level Protection with AWS WAF
Automate using AWS Lambda based
security automations
Utilize Managed Rules from the AWS
Marketplace for hassle free protection and
deployment
Customize security to your applications
using custom rules
Monitor using Amazon CloudWatch metrics
or third-party log processorsAWS WAF
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Deploying AWS WAF is easy
Amazon CloudFront AWS Application
Load Balancer
Amazon API Gateway
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Regional availability of AWS WAF
and AWS Shield Advanced
• N. Virginia (us-east-1)
• Ohio (us-east-2)
• Oregon (us-west-2)
• N. California (us-west-1)
• Ireland (eu-west-1)
• Frankfurt (eu-central-1)
• Tokyo (ap-northeast-1)
• Sydney (ap-southeast-2)
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Regional availability of AWS WAF
and AWS Shield Advanced
• N. Virginia (us-east-1)
• Ohio (us-east-2)
• Oregon (us-west-2)
• N. California (us-west-1)
• Ireland (eu-west-1)
• Frankfurt (eu-central-1)
• Tokyo (ap-northeast-1)
• Sydney (ap-southeast-2)
• London (eu-west-2)
• Stockholm (eu-north-1)
• Singapore (ap-southeast-1)
• Seoul (ap-northeast-2)
NEW!
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Tools available within AWS WAF
• SQL Injection
Conditions
• XSS Conditions
• AWS CloudFormation
based Security
Automation
• AWS Marketplace
Managed Rules
WebTraffic
Filtering
• Rate-based Rules
• IP-Match & Geo-IP
Filters
• Regex & String
Match Conditions
• Size Constraint
Conditions
Visibility and
Debugging
• Amazon
CloudWatch Metrics
and Alarms
• Sampled Logs
• Comprehensive
Logging
Malicious
Traffic Blocking
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Managed Rules for AWS WAF
• Rules written, updated and managed by security
experts
• Pay as you go; available through AWS
Marketplace
• Choice of protections:
• OWASP Top 10 & General Web Exploits
• Common Vulnerabilities and Exposures (CVE)
• Bot Protection
• IP Reputation lists
• CMS (e.g. Wordpress, Joomla)
• Webservers (e.g. Apache, Nginx)
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security automations using AWS WAF
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security automations using AWS WAF
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Amazon GuardDuty and AWS WAF integration
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Firewall Manager
Ensure Compliance to Mandatory Rules
Across Organization
Simplify Management of Rules Across
Accounts & Applications
Enable Rapid Response to Attacks
AcrossAllAccounts
AWS Firewall
Manager
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Regional availability of AWS Firewall Manager
• N. Virginia (us-east-1)
• Ohio (us-east-2)
• Oregon (us-west-2)
• Ireland (eu-west-1)
• Frankfurt (eu-central-1)
• Tokyo (ap-northeast-1)
• Sydney (ap-southeast-2)
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Key benefits for AWS Firewall Manager
 Integrated with AWS Organizations so you can enable AWS
WAF rules across multiple AWS accounts.
 Firewall Manager Policies can span across Accounts and
across resources.
 Supports Hierarchical rules - Security administrator can create
organization-wide rules, while delegating application-specific
rules to individual Account owners.
Simplify Firewall Rules Management Across Accounts & Resources
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Key benefits for AWS Firewall Manager
Ensure Compliance of Existing and New Applications
 Ensure All your resources comply with a mandatory set of
security policies
 Automatically discover new Accounts, or resources like ALB or
CloudFront distribution as they are created
 Easily block traffic from embargoed countries across your
Organization to adhere to the US Dept. of Treasury’s Office of
Foreign Assets Control (OFAC) regulations
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Firewall Manager Key Benefits
 Security administrator have a single console to receive real-time threats, and
respond within minutes
 Quickly apply CVE Patches across all applications in your Organization, or
block malicious IP addresses detected by GuardDuty across entire
Organization
Enable Rapid Response to Internet Attacks
GuardDuty CloudWatch Events Lambda
Amazon
GuardDuty
Amazon
CloudWatch
CloudWatch
Event
Lambda
Function
AWS Lambda
Firewall Manager
Account 2
Account 3
Account 1
AWS WAF
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Thank You!

Mais conteúdo relacionado

Mais procurados

Kubernetes on AWS with Amazon EKS
Kubernetes on AWS with Amazon EKSKubernetes on AWS with Amazon EKS
Kubernetes on AWS with Amazon EKSAmazon Web Services
 
Introducing AWS DataSync - Simplify, automate, and accelerate online data tra...
Introducing AWS DataSync - Simplify, automate, and accelerate online data tra...Introducing AWS DataSync - Simplify, automate, and accelerate online data tra...
Introducing AWS DataSync - Simplify, automate, and accelerate online data tra...Amazon Web Services
 
Microservices on AWS: Architectural Patterns and Best Practices | AWS Summit ...
Microservices on AWS: Architectural Patterns and Best Practices | AWS Summit ...Microservices on AWS: Architectural Patterns and Best Practices | AWS Summit ...
Microservices on AWS: Architectural Patterns and Best Practices | AWS Summit ...Amazon Web Services
 
Immersion Day - Well Architected Workshop - June 2019
Immersion Day - Well Architected Workshop - June 2019Immersion Day - Well Architected Workshop - June 2019
Immersion Day - Well Architected Workshop - June 2019Amazon Web Services
 
An Introduction to the AWS Well Architected Framework - Webinar
An Introduction to the AWS Well Architected Framework - WebinarAn Introduction to the AWS Well Architected Framework - Webinar
An Introduction to the AWS Well Architected Framework - WebinarAmazon Web Services
 
AWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAmazon Web Services
 
[AWS Builders] AWS상의 보안 위협 탐지 및 대응
[AWS Builders] AWS상의 보안 위협 탐지 및 대응[AWS Builders] AWS상의 보안 위협 탐지 및 대응
[AWS Builders] AWS상의 보안 위협 탐지 및 대응Amazon Web Services Korea
 
Advanced Security Best Practices Masterclass
Advanced Security Best Practices MasterclassAdvanced Security Best Practices Masterclass
Advanced Security Best Practices MasterclassAmazon Web Services
 
Disaster Recovery with the AWS Cloud
Disaster Recovery with the AWS CloudDisaster Recovery with the AWS Cloud
Disaster Recovery with the AWS CloudAmazon Web Services
 
Deep Dive on Amazon GuardDuty - AWS Online Tech Talks
Deep Dive on Amazon GuardDuty - AWS Online Tech TalksDeep Dive on Amazon GuardDuty - AWS Online Tech Talks
Deep Dive on Amazon GuardDuty - AWS Online Tech TalksAmazon Web Services
 
AWS Builders Online Series | AWS와 함께하는 클라우드 컴퓨팅 - 강철, AWS 어카운트 매니저
AWS Builders Online Series | AWS와 함께하는 클라우드 컴퓨팅 - 강철, AWS 어카운트 매니저AWS Builders Online Series | AWS와 함께하는 클라우드 컴퓨팅 - 강철, AWS 어카운트 매니저
AWS Builders Online Series | AWS와 함께하는 클라우드 컴퓨팅 - 강철, AWS 어카운트 매니저Amazon Web Services Korea
 
Designing security & governance via AWS Control Tower & Organizations - SEC30...
Designing security & governance via AWS Control Tower & Organizations - SEC30...Designing security & governance via AWS Control Tower & Organizations - SEC30...
Designing security & governance via AWS Control Tower & Organizations - SEC30...Amazon Web Services
 
20200714 AWS Black Belt Online Seminar Amazon Neptune
20200714 AWS Black Belt Online Seminar Amazon Neptune20200714 AWS Black Belt Online Seminar Amazon Neptune
20200714 AWS Black Belt Online Seminar Amazon NeptuneAmazon Web Services Japan
 
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...Amazon Web Services
 
AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar Amazon Web Services
 

Mais procurados (20)

Kubernetes on AWS with Amazon EKS
Kubernetes on AWS with Amazon EKSKubernetes on AWS with Amazon EKS
Kubernetes on AWS with Amazon EKS
 
Introducing AWS DataSync - Simplify, automate, and accelerate online data tra...
Introducing AWS DataSync - Simplify, automate, and accelerate online data tra...Introducing AWS DataSync - Simplify, automate, and accelerate online data tra...
Introducing AWS DataSync - Simplify, automate, and accelerate online data tra...
 
Microservices on AWS: Architectural Patterns and Best Practices | AWS Summit ...
Microservices on AWS: Architectural Patterns and Best Practices | AWS Summit ...Microservices on AWS: Architectural Patterns and Best Practices | AWS Summit ...
Microservices on AWS: Architectural Patterns and Best Practices | AWS Summit ...
 
Immersion Day - Well Architected Workshop - June 2019
Immersion Day - Well Architected Workshop - June 2019Immersion Day - Well Architected Workshop - June 2019
Immersion Day - Well Architected Workshop - June 2019
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
An Introduction to the AWS Well Architected Framework - Webinar
An Introduction to the AWS Well Architected Framework - WebinarAn Introduction to the AWS Well Architected Framework - Webinar
An Introduction to the AWS Well Architected Framework - Webinar
 
Security Architectures on AWS
Security Architectures on AWSSecurity Architectures on AWS
Security Architectures on AWS
 
AWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets Manager
 
[AWS Builders] AWS상의 보안 위협 탐지 및 대응
[AWS Builders] AWS상의 보안 위협 탐지 및 대응[AWS Builders] AWS상의 보안 위협 탐지 및 대응
[AWS Builders] AWS상의 보안 위협 탐지 및 대응
 
Advanced Security Best Practices Masterclass
Advanced Security Best Practices MasterclassAdvanced Security Best Practices Masterclass
Advanced Security Best Practices Masterclass
 
Disaster Recovery with the AWS Cloud
Disaster Recovery with the AWS CloudDisaster Recovery with the AWS Cloud
Disaster Recovery with the AWS Cloud
 
Deep Dive on Amazon GuardDuty - AWS Online Tech Talks
Deep Dive on Amazon GuardDuty - AWS Online Tech TalksDeep Dive on Amazon GuardDuty - AWS Online Tech Talks
Deep Dive on Amazon GuardDuty - AWS Online Tech Talks
 
AWS Builders Online Series | AWS와 함께하는 클라우드 컴퓨팅 - 강철, AWS 어카운트 매니저
AWS Builders Online Series | AWS와 함께하는 클라우드 컴퓨팅 - 강철, AWS 어카운트 매니저AWS Builders Online Series | AWS와 함께하는 클라우드 컴퓨팅 - 강철, AWS 어카운트 매니저
AWS Builders Online Series | AWS와 함께하는 클라우드 컴퓨팅 - 강철, AWS 어카운트 매니저
 
Cost Optimisation on AWS
Cost Optimisation on AWSCost Optimisation on AWS
Cost Optimisation on AWS
 
Designing security & governance via AWS Control Tower & Organizations - SEC30...
Designing security & governance via AWS Control Tower & Organizations - SEC30...Designing security & governance via AWS Control Tower & Organizations - SEC30...
Designing security & governance via AWS Control Tower & Organizations - SEC30...
 
20200714 AWS Black Belt Online Seminar Amazon Neptune
20200714 AWS Black Belt Online Seminar Amazon Neptune20200714 AWS Black Belt Online Seminar Amazon Neptune
20200714 AWS Black Belt Online Seminar Amazon Neptune
 
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
 
AWS 101
AWS 101AWS 101
AWS 101
 
AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar
 
Black Belt Online Seminar Amazon CloudWatch
Black Belt Online Seminar Amazon CloudWatchBlack Belt Online Seminar Amazon CloudWatch
Black Belt Online Seminar Amazon CloudWatch
 

Semelhante a AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats

AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útokyAWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útokyVladimir Simek
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWSAmazon Web Services
 
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPCAWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPCAmazon Web Services
 
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPCAWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPCAmazon Web Services
 
Automating DDoS and WAF Response
Automating DDoS and WAF ResponseAutomating DDoS and WAF Response
Automating DDoS and WAF ResponseAmazon Web Services
 
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...Amazon Web Services
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSAmazon Web Services
 
AWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAmazon Web Services
 
Learn how AWS customers are implementing robust security posture for their A...
 Learn how AWS customers are implementing robust security posture for their A... Learn how AWS customers are implementing robust security posture for their A...
Learn how AWS customers are implementing robust security posture for their A...Amazon Web Services
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSAmazon Web Services
 
Protect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced AttacksProtect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced AttacksAmazon Web Services
 
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPCInitiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPCAmazon Web Services
 
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPCInitiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPCAmazon Web Services
 
Edge immersion days module 2 - protect your application at the edge using a...
Edge immersion days   module 2 - protect your application at the edge using a...Edge immersion days   module 2 - protect your application at the edge using a...
Edge immersion days module 2 - protect your application at the edge using a...RoiElbaz1
 
Cybersecurity: A Drive Force Behind Cloud Adoption
Cybersecurity: A Drive Force Behind Cloud AdoptionCybersecurity: A Drive Force Behind Cloud Adoption
Cybersecurity: A Drive Force Behind Cloud AdoptionAmazon Web Services
 
AWSome Day MODULE 1 - AWS Foundations
AWSome Day MODULE 1 - AWS FoundationsAWSome Day MODULE 1 - AWS Foundations
AWSome Day MODULE 1 - AWS FoundationsAmazon Web Services
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWSAWS Summits
 

Semelhante a AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats (20)

AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útokyAWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWS
 
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPCAWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
 
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPCAWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
 
Automating DDoS and WAF Response
Automating DDoS and WAF ResponseAutomating DDoS and WAF Response
Automating DDoS and WAF Response
 
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWS
 
AWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & Remediation
 
Learn how AWS customers are implementing robust security posture for their A...
 Learn how AWS customers are implementing robust security posture for their A... Learn how AWS customers are implementing robust security posture for their A...
Learn how AWS customers are implementing robust security posture for their A...
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWS
 
Protect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced AttacksProtect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced Attacks
 
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPCInitiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
 
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPCInitiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
 
Edge immersion days module 2 - protect your application at the edge using a...
Edge immersion days   module 2 - protect your application at the edge using a...Edge immersion days   module 2 - protect your application at the edge using a...
Edge immersion days module 2 - protect your application at the edge using a...
 
AWS_Security_Essentials
AWS_Security_EssentialsAWS_Security_Essentials
AWS_Security_Essentials
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
Cybersecurity: A Drive Force Behind Cloud Adoption
Cybersecurity: A Drive Force Behind Cloud AdoptionCybersecurity: A Drive Force Behind Cloud Adoption
Cybersecurity: A Drive Force Behind Cloud Adoption
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 
AWSome Day MODULE 1 - AWS Foundations
AWSome Day MODULE 1 - AWS FoundationsAWSome Day MODULE 1 - AWS Foundations
AWSome Day MODULE 1 - AWS Foundations
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 

Mais de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mais de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats

  • 1. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Andrew Thomas, GM, AWS Perimeter Protection March, 2019 AWS Edge Security Cloud-Native Defense Against Diverse Internet Threats
  • 2. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Goal • Learn about today’s threat landscape and how these threats can affect your application availability • Learn how easily using AWS services can give you baseline protections • Learn how AWS’s perimeter security services can provide additional application protections, without the need to re-architect
  • 3. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Overview of Threat Landscape
  • 4. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Typical web applications Dynamic applications Personalized Content Static assets API Data CenterEnd Users
  • 5. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Web application design considerations Data Center End Users Dynamic applications Personalized Content Static assets API
  • 6. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Web application design considerations Data Center End Users DDoS Web Exploits Bots • Security • Authentication • Encryption (TLS) • Layered Protection • Availability • Resiliency/Fault Tolerance • Request handling capacity • Blocking bad traffic • Performance • Routing • Throttling • Alerting & Monitoring Dynamic applications Personalized Content Static assets API
  • 7. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Types of threats that exist today SQL Injection Cross-site Scripting (XSS) OWASP Top 10 Common Vulnerabilities and Exposures (CVE) HTTP Floods Reflection Attack Crawlers Content Scrapers Scanners & Probes Denial of Service App Vulnerabilities Bad Bots
  • 8. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Common DDoS attacks SYN Flood UDP Flood ICMP Flood Other Reflection Vectors HTTP Flood DNS Query Flood
  • 9. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Building the Baseline Defense
  • 10. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Building blocks for baseline defense Amazon VPC Amazon CloudFront Amazon Route 53 Security Groups Network ACLs Global Presence SSL/TLS Origin Shielding Resilience (TTL) DNS Header Validations Good vs. Bad Resolvers Priority Based Traffic Shaping
  • 11. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Benefits of the AWS Global Edge Network High Availability Application Acceleration AWS Integration Cost Effective
  • 12. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Leveraging AWS Perimeter Protection Services
  • 13. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What else can we do to… • Defend against DDoS attacks? • Prevent exploits and bots at application level? • Manage and apply security policies across multiple accounts in an organization?
  • 14. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Four tenets of AWS Shield for DDoS protection Frictionless setup with minimal architectural changes Low Operational Overhead for known and edge cases Visibility for dynamic security and compliance Protection from economic vectors AWS Shield
  • 15. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Benefits of AWS Shield Standard and Shield Advanced Built-in DDoS Protection for Everyone Point and Protect Wizard Low Operational Overhead for known and edge cases Visibility for dynamic security and compliance Protection from economic vectors AWS Shield
  • 16. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Benefits of AWS Shield Standard and Shield Advanced Automatic Protection across customers Enhanced Protection baselined to you 24x7 access to DDoS Response Team (DRT) Built-in DDoS Protection for Everyone Point and Protect Wizard Visibility for dynamic security and compliance Protection from economic vectors AWS Shield
  • 17. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Benefits of AWS Shield Standard and Shield Advanced Automatic Protection across customers Enhanced Protection baselined to you 24x7 access to DDoS Response Team (DRT) Built-in DDoS Protection for Everyone Point and Protect Wizard Protection from economic vectors AWS Shield Cloud- Watch Metrics Attack Diagnostics Global Threat Environment Dashboard Quarterly Security Review
  • 18. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Benefits of AWS Shield Standard and Shield Advanced Automatic Protection across customers Enhanced Protection baselined to you 24x7 access to DDoS Response Team (DRT) Built-in DDoS Protection for Everyone Point and Protect Wizard Cloud- Watch Metrics Attack Diagnostics Global Threat Environment Dashboard Quarterly Security Review AWS WAF at no additional cost For protected resources AWS Firewall Manager at no additional cost Cost Protection for scaling AWS Shield
  • 19. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Application Level Protection with AWS WAF Automate using AWS Lambda based security automations Utilize Managed Rules from the AWS Marketplace for hassle free protection and deployment Customize security to your applications using custom rules Monitor using Amazon CloudWatch metrics or third-party log processorsAWS WAF
  • 20. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Deploying AWS WAF is easy Amazon CloudFront AWS Application Load Balancer Amazon API Gateway
  • 21. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Regional availability of AWS WAF and AWS Shield Advanced • N. Virginia (us-east-1) • Ohio (us-east-2) • Oregon (us-west-2) • N. California (us-west-1) • Ireland (eu-west-1) • Frankfurt (eu-central-1) • Tokyo (ap-northeast-1) • Sydney (ap-southeast-2)
  • 22. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Regional availability of AWS WAF and AWS Shield Advanced • N. Virginia (us-east-1) • Ohio (us-east-2) • Oregon (us-west-2) • N. California (us-west-1) • Ireland (eu-west-1) • Frankfurt (eu-central-1) • Tokyo (ap-northeast-1) • Sydney (ap-southeast-2) • London (eu-west-2) • Stockholm (eu-north-1) • Singapore (ap-southeast-1) • Seoul (ap-northeast-2) NEW!
  • 23. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Tools available within AWS WAF • SQL Injection Conditions • XSS Conditions • AWS CloudFormation based Security Automation • AWS Marketplace Managed Rules WebTraffic Filtering • Rate-based Rules • IP-Match & Geo-IP Filters • Regex & String Match Conditions • Size Constraint Conditions Visibility and Debugging • Amazon CloudWatch Metrics and Alarms • Sampled Logs • Comprehensive Logging Malicious Traffic Blocking
  • 24. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Managed Rules for AWS WAF • Rules written, updated and managed by security experts • Pay as you go; available through AWS Marketplace • Choice of protections: • OWASP Top 10 & General Web Exploits • Common Vulnerabilities and Exposures (CVE) • Bot Protection • IP Reputation lists • CMS (e.g. Wordpress, Joomla) • Webservers (e.g. Apache, Nginx)
  • 25. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security automations using AWS WAF
  • 26. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security automations using AWS WAF
  • 27. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon GuardDuty and AWS WAF integration
  • 28. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Firewall Manager Ensure Compliance to Mandatory Rules Across Organization Simplify Management of Rules Across Accounts & Applications Enable Rapid Response to Attacks AcrossAllAccounts AWS Firewall Manager
  • 29. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Regional availability of AWS Firewall Manager • N. Virginia (us-east-1) • Ohio (us-east-2) • Oregon (us-west-2) • Ireland (eu-west-1) • Frankfurt (eu-central-1) • Tokyo (ap-northeast-1) • Sydney (ap-southeast-2)
  • 30. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Key benefits for AWS Firewall Manager  Integrated with AWS Organizations so you can enable AWS WAF rules across multiple AWS accounts.  Firewall Manager Policies can span across Accounts and across resources.  Supports Hierarchical rules - Security administrator can create organization-wide rules, while delegating application-specific rules to individual Account owners. Simplify Firewall Rules Management Across Accounts & Resources
  • 31. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Key benefits for AWS Firewall Manager Ensure Compliance of Existing and New Applications  Ensure All your resources comply with a mandatory set of security policies  Automatically discover new Accounts, or resources like ALB or CloudFront distribution as they are created  Easily block traffic from embargoed countries across your Organization to adhere to the US Dept. of Treasury’s Office of Foreign Assets Control (OFAC) regulations
  • 32. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Firewall Manager Key Benefits  Security administrator have a single console to receive real-time threats, and respond within minutes  Quickly apply CVE Patches across all applications in your Organization, or block malicious IP addresses detected by GuardDuty across entire Organization Enable Rapid Response to Internet Attacks GuardDuty CloudWatch Events Lambda Amazon GuardDuty Amazon CloudWatch CloudWatch Event Lambda Function AWS Lambda Firewall Manager Account 2 Account 3 Account 1 AWS WAF
  • 33. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Thank You!

Notas do Editor

  1. Learn how you can defend your applications on AWS against diverse set of Internet threats, like DDoS, Bots or Zero-day attacks. At this session you will learn about how your applications on AWS are inherently secured against common threats. You will also learn about how you can use AWS security services like AWS WAF, Shield and Firewall Manager to build a robust and customised protection specific to your applications.
  2. A simple on-premise based solution. Maybe mention that a lot of people rely on security through obscurity?
  3. There are tons of attacks you need to think about, and these leads into bunch of challenging design considerations.
  4. There are tons of attacks you need to think about, and these leads into bunch of challenging design considerations.
  5. A good Web Application Firewall should help you quickly set fundamental protections, customize them to your applications and help you easily visualize your actions so you can create a dynamic security posture.
  6. Pointing out the the benefits of AWS WAF. Perhaps rename title?
  7. This is animated (arrow) Call out more on API Gateway, our recent launch.
  8. This is animated (arrow) Call out more on API Gateway, our recent launch.
  9. This is animated (arrow) Call out more on API Gateway, our recent launch.
  10. This is animated (by verticals) Talk about how these tools can help build solution to deal with bad bots and app vulnerabilities. Mention how we have OWASP and CVE protection from managed rules. Also our own OWASP whitepaper.
  11. https://aws.amazon.com/answers/security/aws-waf-security-automations/ Configuring a web application firewall strategy can be challenging and burdensome to large and small organizations alike, especially for those who do not have dedicated security teams. To simplify this process, we offer Security Automations solution which provides fine-grained control over the requests attempting to access your web application.
  12. https://aws.amazon.com/answers/security/aws-waf-security-automations/ Configuring a web application firewall strategy can be challenging and burdensome to large and small organizations alike, especially for those who do not have dedicated security teams. To simplify this process, we offer Security Automations solution which provides fine-grained control over the requests attempting to access your web application.
  13. https://aws.amazon.com/blogs/security/how-to-use-amazon-guardduty-and-aws-web-application-firewall-to-automatically-block-suspicious-hosts/ How to use Amazon GuardDuty and AWS Web Application Firewall to automatically block suspicious hosts 1. A GuardDuty finding is raised with suspected malicious activity. 2. A CloudWatch Event is configured to filter for GuardDuty Finding type. 3. A Lambda function is invoked by the CloudWatch Event and parses the GuardDuty finding. 4. State data for blocked hosts is stored in Amazon DynamoDB table. The Lambda function checks the state table for existing host entry. 5. The Lambda function creates a Rule inside AWS WAF and in a VPC NACL. 6. A notification email is sent via Amazon Simple Notification Service (SNS).
  14. Simplified Management of WAF Rules Integrated with AWS Organizations Centrally managed global rules and account-specific rules Ensure Compliance to WAF Rules Ensure entire Organization adheres to mandatory set of rules Apply protection even when new Accounts or resources are created Central Visibility Across Organization Central visibility of WAF threats across Organization Compliance Dashboard for audit firewall status An organization’s InfoSec team learns and operates WAF instead of each Account owner
  15. This is animated (arrow) Call out more on API Gateway, our recent launch.