Logo

dev-resources.site

for different kinds of informations.

Blocking Web Traffic With WAF In AWS

Published at
10/26/2024
Categories
devops
technology
software
trending
Author
anshul_kichara
Author
14 person written this
anshul_kichara
open
Blocking Web Traffic With WAF In AWS

Travel Triangle’s WhatsApp application was experiencing significant performance degradation due to harmful “User Agents,” leading to decreased business and reputational harm. The need to mitigate these risks prompted an exploration of various solutions, culminating in the selection of AWS WAF.

Solution:
AWS WAF was chosen for its ability to effectively block malicious traffic while being cost-efficient. This document outlines the specific steps taken to configure AWS WAF, detailing how it was used to filter and block the harmful “User Agents,” thus protecting the application’s performance and ensuring business continuity.

Introduction

What’s WAF (web application firewall)?

  1. AWS WAF is a web application firewall that helps you protect your web applications against common web exploits that might affect availability and compromise security.
  2. AWS WAF gives you control over how traffic reaches your applications by enabling you to create security rules that block common attack patterns like SQL injection and cross-site scripting.
  3. It only allows the request to reach the server based on the rules or patterns you define.
  4. Users create their own rules and specify the conditions that AWS WAF searches for in incoming web requests.
  5. The cost of WAF is only for what you use.
  6. The pricing is based on how many rules you deploy and how many web requests your application receives.
  7. For example, you can deploy AWS WAF on Amazon CloudFront with an Application Load Balancer in front of your web servers or servers running on EC2.

Features of WAF

Web traffic filtering using custom rules

You can create your own rules, depending on your requirements, whether to block or allow incoming and outgoing requests. You can also customize the string that appears in your web request.
Blocking malicious requests

You can also configure rules in AWS WAF to identify and block web request threats like SQL injections and cross-site scripting.
Tune your rules and monitor traffic

AWS WAF also allows us to review our rules and customize them to prevent new attacks from reaching the server.

Application Load Balancer (ALB)

  1. Load Balancer is a service that allows you to distribute the incoming application or network traffic across multiple targets, such as Amazon EC2 instances, containers, and IP addresses, in multiple Availability Zones.
  2. ALB is used to route the HTTP and HTTPS traffic across the targets based on the rules attached to the target group.
  3. Rules determine what action is taken when a rule matches a client’s request.
  4. The target group is used to route requests across registered targets as part of an action rule. Target groups consist of a protocol and target port. We can also configure health checks to monitor the status of the target group. A single ALB can route traffic to multiple target groups.
  5. Targets consist of EC2 instances that are registered with the ALB as part of a target group.

Architecture Diagram

Image description

You can check more info about: WAF In AWS.

trending Article's
30 articles in total
Favicon
Data Privacy Challenges in Cloud Environments
Favicon
What Is SRE Support?
Favicon
Can Cloud Data Be Hacked
Favicon
How to Secure APIs in Microservices
Favicon
Dynamic Infrastructure Provisioning with Serverless DevOps
Favicon
What is Machine Learning? A Beginner's Guide to Understanding the Basics
Favicon
Securing Software Supply Chains with SLSA
Favicon
What is a Network Operations Center (NOC)
Favicon
Generative AI vs. Traditional AI: Key Differences and Use Cases
Favicon
How to Activate Virtual Environment in Python VS Code
Favicon
Ctrl+Shift+Epic : Deployment Strategies Unleashed
Favicon
Unlocking the Power of Database as a Service (DBaaS): A Comprehensive Overview
Favicon
Understanding OAI and OAC in AWS CloudFront: Concepts, Configuration, and Best Practices
Favicon
Modern Traffic Management with Gateway API in Kubernetes
Favicon
Implementing GitOps with ArgoCD
Favicon
Restoring a Backup Stored in S3 to an EC2 Instance Using XtraBackup
Favicon
AWS Firewall- Samurai Warriors
Favicon
Understanding COW and MOR in Apache Hudi: Choosing the Right Storage Strategy
Favicon
How to Create a Sitemap for a Website
Favicon
The Remaining Issues With Path Of Exile 2’s Early Access Endgame - Forbes
Favicon
How to Use Generative AI for Video Production?
Favicon
Transforming Legacy Systems: Common Pitfalls and Best Practices
Favicon
Introduction to cloud data engineering with AWS
Favicon
Using Apache Flink for Real-time Stream Processing in Data Engineering
Favicon
Setup Cross Cluster Replication for Data migration in Elasticsearch
Favicon
Database Migration Service in AWS
Favicon
Tangle Free Robot Vacuum Cleaner with 2.4GWiFi/App/Alexa Control, Automatic Vacuum Robot Cleaner for Low Carpet Pet Hair
Favicon
Blocking Web Traffic With WAF In AWS
Favicon
Addressing the Rise of Cloud Security Threats: Best Practices for 2024
Favicon
Addressing the Rise of Cloud Security Threats: Best Practices for 2024

Featured ones: