Security Automations for AWS WAF

Deploy a set of preconfigured AWS WAF rules to filter common web-based attacks

Overview

Security Automations for AWS WAF automatically deploys a set of AWS WAF (web application firewall) rules that filter common web-based attacks. You can select from preconfigured protective features that define the rules included in an AWS WAF web access control list (ACL). Once deployed, AWS WAF protects your Amazon CloudFront distributions or Application Load Balancers by inspecting web requests.

You can use AWS WAF to create custom, application-specific rules that block attack patterns to help ensure application availability, secure resources, and prevent excessive resource consumption.

This AWS Solution supports the latest version of the AWS WAF (AWS WAFV2) service API.

Benefits

Automatic WAF rules configuration

Automatically launch and configure the AWS WAF settings and protective features that you choose to include during initial deployment by using the AWS CloudFormation template.

Log analysis

Activate AWS CloudFormation to provision an Amazon Athena query and a scheduled AWS Lambda function responsible for orchestrating Athena, processing result output, and updating AWS WAF.

Build your own monitoring dashboard

Build a customized dashboard to visualize Amazon CloudWatch metrics emitted by this solution, and gain insights into the pattern of attacks and protection provided by AWS WAF.

Technical details

You can automatically deploy this architecture using the implementation guide and the accompanying AWS CloudFormation template.

Use cases for this AWS Solution
  • Headline
More…
Deployment options
Ready to get started?
Deploy this solution by launching it in your AWS Console

Note: Before you launch the solution in the AWS Management Console, ensure that you meet the prerequisites in the implementation guide.


Need help? Deploy with a partner.
Find an AWS Certified third-party expert to assist with this deployment
Training
Getting Started with AWS Security, Identity, and Compliance

This course provides an overview of AWS security technology, use cases, benefits, and services. The infrastructure protection section covers AWS WAF for traffic filtering.

Enroll now 
Training
Introduction to Amazon Macie

Amazon Macie is a security service that uses machine learning to automatically discover, classify, and protect sensitive data in AWS. In this course, you will be introduced to Amazon Macie, how the service works, and the underlying concepts driving the service.

Enroll now 
Training
AWS Certified Security – Specialty

This exam tests your technical expertise in securing the AWS platform. This is for anyone in an experienced security role.

Schedule your exam 
Case Study
Peach Logo
Peach Boosts Security and Customer Confidence Using AWS Security Automations
Digital advertising company Peach has a large digital footprint but historically has not been at high risk for cyberattacks. But when it noticed an uptick in attacks, the company knew it needed to take further steps to protect its systems.
 

So Peach turned to AWS for a solution, and now Peach not only blocks cyberattacks but also deters them—reducing needless service slowdowns and boosting customer confidence.

Read the full case study 
Video
A Security Solution for Peach
Watch the video 

Was this page helpful?