Overview
Product video
Imperva SecureSphere WAF for AWS combines the world's most-trusted web application firewall with cloud-based DDoS protection and visibility and control for your AWS Management Console. SecureSphere for AWS is the first enterprise-class Web Application Firewall tailored specifically for Amazon Web Services. Running natively in AWS, and leveraging all its capabilities, SecureSphere for AWS scales on-demand with AWS applications. SecureSphere applies multiple defenses and correlates results to offer laser-accurate attack detection. Certified by ICSA Labs, SecureSphere addresses PCI 6.6 and provides ironclad protection against the OWASP Top Ten, including SQL Injection, XSS and CSRF.
Highlights
- Automated Protection - Patented Dynamic Profiling technology streamlines management and lowers operations costs by learning application changes over time. Security updates from the Imperva ADC protect applications against the latest threats.
- Flexible Deployment Options - The SecureSphere WAF offers organizations automated, adaptable security and easy deployment into Amazon environments with full support for elastic load balancing and CloudFormation.
- Fraud and Automated Attack Protection - With advanced bot detection capabilities, IP Reputation, granular custom rules, and fraud integration, SecureSphere stops dangerous threats like site scraping, application DDoS, comment spam, and web fraud.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Additional AWS infrastructure costs
Type | Cost |
---|---|
EBS General Purpose SSD (gp2) volumes | $0.10/per GB/month of provisioned storage |
Vendor refund policy
We do not support refunds, but customers can cancel at any time. Contact Imperva for more information.
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Additional details
Usage instructions
AUTOMATIC DEPLOYMENT (RECOMMENDED)
Imperva simplifies the deployment of your WAF Gateway infrastructure on AWS by providing dynamically generated CloudFormation and Terraform templates tailored to your specific requirements via the Imperva Cloud Template Tool.
For detailed instructions and additional information: https://docs.imperva.com/bundle/v15.0-waf-on-amazon-aws-byol-installation-guide/page/10450.htm
MANUAL DEPLOYMENT
DISCLAIMER: This procedure is not intended for use in large-scale production environments. For a best-practice installation, use the automated deployment method.
- Create a VPC, a key pair and at least one subnet.
- Create a security group for the Management Server and another security group for the Gateway instances.
- Create the following inbound rules:
- [Management Server SG] ==> [Gateway SG] @ TCP:443
- [Gateway SG] ==> [Management Server SG] @ TCP:8083, TCP:8085
- [Administrative IP ranges] ==> [Management Server SG] @ TCP:8083, TCP:22
- [Administrative IP ranges] ==> [Management Server SG] @ TCP:22
- [Administrative IP ranges] ==> [Gateway SG] @ TCP:22
- [Client ranges] ==> [Gateway SG] @ [reverse proxy ports] (variable)
- Launch your first instance using the product's AMI. For the instance's security group, select the Management Server security group you've created.
- Wait for the instance's status checks to pass and SSH into the instance as root using the supplied key pair's private key.
- Execute the First-Time login command below to configure your instance as a Management Server. This process can take up to 20 minutes.
/opt/imperva/impcli/commands/ftl --silent --product WAF --component Management --grub_password <grub_password> --database_password <database_password> --secure_password <secure_password> --system_password <system_password> --timezone <timezone> --model_type AVM150
- Replace all <variables> with your own values.
- After running the FTL, root access via SSH will be blocked by default as a security measure. To undo this, delete the contents of /etc/security/access.conf and add the following line:
+:root:ALL
- Once the First-Time Login has finished successfully, access your Management Server's user interface from a browser (https://<MX_IP>:8083).
- Accept the EULA and set the admin password as requested.
- Supply your license file or FlexProtect activation code (obtained from Imperva). Wait for the license upload to complete and verify you're able to log in as the admin user.
- To create Gateways, launch one or more instances from the same AMI, attached to the Gateway security group.
- Once the instances have passed all status checks, SSH into each instance and execute the following commands to configure it as a Gateway:
bootstrap_set //bootstrap/product/components/gateway/cloud gateway_group "aws"
/opt/imperva/impcli/commands/ftl --silent --component Gateway --model_type <AV1000 or AV2500> --management_ip <management_server_ip> --secure_password <secure_password> --system_password <system_password> --imperva_password <imperva_password> --grub_password <grub_password> --product WAF --timezone UTC --gateway_mode reverse-proxy-hades --gateway_group aws --is_advanced_bridge Disabled
- Replace all <variables> with your own values.
- For <management_ip>, supply the private IP of the Management Server instance created earlier.
- For model_type, enter either AV1000 or AV2500 based on your license's supported Gateway modules. The AV2500 model provides the highest performance.
- After successfully running the FTL on all instances, log in to your Management Server's user interface, navigate to Setup > Gateways and verify that all Gateways appear as Running under the aws Gateway group. This might take up to 5 minutes after completing the FTL.
- Refer to the user guide to configure your environment as desired and protect your applications: https://docs.imperva.com/bundle/v15.3-waf-user-guide/page/70414.htm
Resources
Support
Vendor support
Imperva's team of Support Engineers is positioned across the globe to provide 24x7x365 coverage, and can be contacted by phone, email, or online via our Self Service Support Portal. Visit the Imperva Support page above for more details.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.