SlideShare a Scribd company logo
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS WAF & Shield Advanced
Protect your application at the Edge
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Threat landscape
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Types of threats
Application
Ping of Death | ICMP Flood | Teardrop | reflections | UDP floods
SYN/ACK Flood | Slowloris | SSL Abuse
Presentation
Session
Transport
Network
HTTP Flood |
Malformed HTTP
App exploits |
CVE |s XSS | SQLi |
RFI
Bots | Scrapers |
Crawlers
Bad BotsDDoS
Web Application
Attacks
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Trends of DDoS attacks
0
200
400
600
800
1000
1200
1400
1600
2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018
Largest DDoS Attacks (Gbps)
Largest DDoS Attacks
Memcached Attacks
Mirai Attacks
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Cloud native protection
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Pillars of perimeter protection
MONITOR
RESPOND
PREPARE
Build a DDoS resilient
application on AWS
Be aware of threat
environment and
application health
Engage response team
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Cloud native protection
Built-in protection Protection tools
Always-on
Automatic
Distributed
Easy to use
Customizable
APIs
AWS scale Experts support
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Built-in protection for everyone
AWS Shield Standard Automatic defense against the most
common network and transport layer DDoS
attacks for any AWS resource, in any AWS
Region
Available to ALL AWS customers at no
additional cost
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Daily DDoS attacks mitigated by AWS
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Protection tools
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
DDoS resilient architecture
Route 53
ALB Security Group
EC2
Instances
Application
Load Balancer
CloudFront
Public Subnet
Web Application
Security Group
Private Subnet
AWS WAF
DDoS
Attack
Users
Cloudwatch
S3
API
Gateway
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
API Acceleration - Slack
• Slack host their API behind ALB for
serving json files with more than 10B
requests/week. They were looking for
DDoS protection
• Slack selected CloudFront for its
reliability, flexibility and AWS
integration Average response time decreased
to 200ms from 480ms
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS WAF & Shield Advanced
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS WAF
Managed layer 7 inspection and mitigation tool,
monitors HTTP/S requests and protects web
applications from malicious activities
Custom Rules Security AutomationManaged Rules
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS WAF benefits
AWS WAF
Easy to deploy
Fast incident response
Affordable
Full API support
Managed service
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Custom rules
1. Define conditions: IP Match, Geo-IP, String Match, Regex Match, SQLi,
XSS, Size Constraints
2. Define rules: Regular or rate based
3. Add to Web Access Control Lists: Order & action (Block, Allow, Count)
4. Attach to AWS Resource: CloudFront, ALB
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Seller managed rules
Rules managed by experts
Choice of 6 partners
Pay as you go
Easy to deploy
automatic updates
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security automations
Honeypot for
bad bots
CloudFront
Log parsing
Reputation
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
WAF automation - eVitamins
• An global online retailer of health and
beauty products. They were looking to
solve DDoS, Bots & Crawlers security
challenges.
• eVitamins selected AWS WAF for its
protection, automation and easiness
of use.
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Firewall manager
• Central
management for
Security profile
• Automated policy
enforcement
across accounts &
applications
• WAF rule sets
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Additional detection & monitoring
Advanced protection
Visibility into attack detection & mitigation
AWS WAF & FM at no additional cost
24X7 DDoS Response Team
Cost protection (absorb scaling costs)
Advanced Protection
AWS Shield
Advanced
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
CloudWatch metrics for Shield Advanced
Metrics:
• DDoSDetected
• DDoSAttackBitsPerSecond,
DDoSAttackPacketsPerSecond,
DDoSAttackRequestsPerSecond
Dimensions:
• UDPTraffic, DNSReflection,
SYNFlood, RequestFlood…
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Improving DDoS response time
Customer account AWS managed capabilities
AWS Shield
Engagement Lambda
DRT notification
topic
SoC Engineer
Shield Advanced
IoT button
DRT
Support
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
attacks
MONITOR
RESPOND
PREPARE
AWS ShieldInternet
Cloud native protection in a nutshell
AWS
services
AWS WAF
Customer
infrastructure
Application
Presentation
Session
Transport
Network
Web
Application
Attacks
DDoS
Bad Bots
x x x x
MONITOR
RESPOND
PREPARE
DDoS
Cloudwatch CloudFront
Access logs
DDoS
Response
Team
Security Automation
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
To learn more about Perimeter protection on AWS
DDoS Resiliency Whitepaper
AWS re:Invent 2017: Automating DDoS Response in the
Cloud (SID324)
AWS re:Invent 2017: NEW LAUNCH! Introduction to
Managed Rules for AWS WAF (SID217)
Best Practices for DDoS Mitigation on AWS
Advanced Techniques for Securing Your Web Applications
with AWS WAF and AWS Shield
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Appendixes
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Evolution of WAF & DDoS mitigation
On-Premise Cloud-Routed Cloud-Native
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
WebACL example
Rule
Allow, Count, Block
Rate-Based Rule
Count, Block
Rule
Allow, Count, Block
Match Condition
SQL injection
Match Condition
Cross-site scripting
Match Condition
Size constraint
Match Condition
IP addresses
Managed Rules
No override, Override to count
WebACL
WebACL
Match Condition
String and Regex
Match Condition
Geo match
Rule
Allow, Count, Block
Rule
Allow, Count, Block
Rule
Allow, Count, Block

More Related Content

PPTX
Introduction to AWS WAF and AWS Firewall Manager
PPTX
Aws meetup aws_waf
PDF
Defending your workloads with aws waf and deep security
PDF
Amazon CloudFront Best Practices and Anti-patterns
PDF
Amazon guard duty_lab
PDF
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
PDF
Mitigating techniques
PDF
Intro to threat_detection_and_remediation on aws
Introduction to AWS WAF and AWS Firewall Manager
Aws meetup aws_waf
Defending your workloads with aws waf and deep security
Amazon CloudFront Best Practices and Anti-patterns
Amazon guard duty_lab
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
Mitigating techniques
Intro to threat_detection_and_remediation on aws

Similar to Edge immersion days module 2 - protect your application at the edge using aws waf & shield advanced (20)

PDF
D do s_white_paper
PPTX
#ALSummit: Alert Logic & AWS - AWS Security Services
PDF
D do s_white_paper_june2015
PDF
Network Security Design Bla Bla Bla Bla B
PPTX
Security
PPTX
Managing Security on AWS
PDF
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
PPTX
AWS Security and Compliance Presentation
PDF
Protect Your Data and Apps in the Public Cloud
PPTX
5 minutes on security
PDF
What is AWS DDoS Protection, and why is it needed_.pdf
PPTX
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
PDF
AWS_security_at_scale__From_development_to_production.pdf
PDF
Connect Ops and Security with Flexible Web App and API Protection
PDF
Maximize your investment with AWS Native Security Controls
PDF
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
PPTX
Automating AWS security and compliance
PPTX
AWS SSA Webinar 11 - Getting started on AWS: Security
PPTX
AWS SSA Webinar 7 - Getting Started on AWS
PDF
Amazon Web Services Security
D do s_white_paper
#ALSummit: Alert Logic & AWS - AWS Security Services
D do s_white_paper_june2015
Network Security Design Bla Bla Bla Bla B
Security
Managing Security on AWS
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
AWS Security and Compliance Presentation
Protect Your Data and Apps in the Public Cloud
5 minutes on security
What is AWS DDoS Protection, and why is it needed_.pdf
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
AWS_security_at_scale__From_development_to_production.pdf
Connect Ops and Security with Flexible Web App and API Protection
Maximize your investment with AWS Native Security Controls
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
Automating AWS security and compliance
AWS SSA Webinar 11 - Getting started on AWS: Security
AWS SSA Webinar 7 - Getting Started on AWS
Amazon Web Services Security
Ad

Recently uploaded (20)

PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
DOCX
Unit-3 cyber security network security of internet system
PPT
tcp ip networks nd ip layering assotred slides
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
Funds Management Learning Material for Beg
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
Power Point - Lesson 3_2.pptx grad school presentation
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Paper PDF World Game (s) Great Redesign.pdf
Introuction about ICD -10 and ICD-11 PPT.pptx
international classification of diseases ICD-10 review PPT.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Unit-3 cyber security network security of internet system
tcp ip networks nd ip layering assotred slides
presentation_pfe-universite-molay-seltan.pptx
An introduction to the IFRS (ISSB) Stndards.pdf
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Decoding a Decade: 10 Years of Applied CTI Discipline
Slides PPTX World Game (s) Eco Economic Epochs.pptx
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PptxGenJS_Demo_Chart_20250317130215833.pptx
522797556-Unit-2-Temperature-measurement-1-1.pptx
Funds Management Learning Material for Beg
Ad

Edge immersion days module 2 - protect your application at the edge using aws waf & shield advanced

  • 1. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS WAF & Shield Advanced Protect your application at the Edge
  • 2. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Threat landscape
  • 3. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Types of threats Application Ping of Death | ICMP Flood | Teardrop | reflections | UDP floods SYN/ACK Flood | Slowloris | SSL Abuse Presentation Session Transport Network HTTP Flood | Malformed HTTP App exploits | CVE |s XSS | SQLi | RFI Bots | Scrapers | Crawlers Bad BotsDDoS Web Application Attacks
  • 4. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Trends of DDoS attacks 0 200 400 600 800 1000 1200 1400 1600 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 Largest DDoS Attacks (Gbps) Largest DDoS Attacks Memcached Attacks Mirai Attacks
  • 5. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Cloud native protection
  • 6. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Pillars of perimeter protection MONITOR RESPOND PREPARE Build a DDoS resilient application on AWS Be aware of threat environment and application health Engage response team
  • 7. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Cloud native protection Built-in protection Protection tools Always-on Automatic Distributed Easy to use Customizable APIs AWS scale Experts support
  • 8. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Built-in protection for everyone AWS Shield Standard Automatic defense against the most common network and transport layer DDoS attacks for any AWS resource, in any AWS Region Available to ALL AWS customers at no additional cost
  • 9. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Daily DDoS attacks mitigated by AWS
  • 10. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Protection tools
  • 11. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. DDoS resilient architecture Route 53 ALB Security Group EC2 Instances Application Load Balancer CloudFront Public Subnet Web Application Security Group Private Subnet AWS WAF DDoS Attack Users Cloudwatch S3 API Gateway
  • 12. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. API Acceleration - Slack • Slack host their API behind ALB for serving json files with more than 10B requests/week. They were looking for DDoS protection • Slack selected CloudFront for its reliability, flexibility and AWS integration Average response time decreased to 200ms from 480ms
  • 13. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS WAF & Shield Advanced
  • 14. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS WAF Managed layer 7 inspection and mitigation tool, monitors HTTP/S requests and protects web applications from malicious activities Custom Rules Security AutomationManaged Rules
  • 15. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS WAF benefits AWS WAF Easy to deploy Fast incident response Affordable Full API support Managed service
  • 16. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Custom rules 1. Define conditions: IP Match, Geo-IP, String Match, Regex Match, SQLi, XSS, Size Constraints 2. Define rules: Regular or rate based 3. Add to Web Access Control Lists: Order & action (Block, Allow, Count) 4. Attach to AWS Resource: CloudFront, ALB
  • 17. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Seller managed rules Rules managed by experts Choice of 6 partners Pay as you go Easy to deploy automatic updates
  • 18. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security automations Honeypot for bad bots CloudFront Log parsing Reputation
  • 19. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. WAF automation - eVitamins • An global online retailer of health and beauty products. They were looking to solve DDoS, Bots & Crawlers security challenges. • eVitamins selected AWS WAF for its protection, automation and easiness of use.
  • 20. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Firewall manager • Central management for Security profile • Automated policy enforcement across accounts & applications • WAF rule sets
  • 21. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Additional detection & monitoring Advanced protection Visibility into attack detection & mitigation AWS WAF & FM at no additional cost 24X7 DDoS Response Team Cost protection (absorb scaling costs) Advanced Protection AWS Shield Advanced
  • 22. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. CloudWatch metrics for Shield Advanced Metrics: • DDoSDetected • DDoSAttackBitsPerSecond, DDoSAttackPacketsPerSecond, DDoSAttackRequestsPerSecond Dimensions: • UDPTraffic, DNSReflection, SYNFlood, RequestFlood…
  • 23. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Improving DDoS response time Customer account AWS managed capabilities AWS Shield Engagement Lambda DRT notification topic SoC Engineer Shield Advanced IoT button DRT Support
  • 24. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. attacks MONITOR RESPOND PREPARE AWS ShieldInternet Cloud native protection in a nutshell AWS services AWS WAF Customer infrastructure Application Presentation Session Transport Network Web Application Attacks DDoS Bad Bots x x x x MONITOR RESPOND PREPARE DDoS Cloudwatch CloudFront Access logs DDoS Response Team Security Automation
  • 25. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. To learn more about Perimeter protection on AWS DDoS Resiliency Whitepaper AWS re:Invent 2017: Automating DDoS Response in the Cloud (SID324) AWS re:Invent 2017: NEW LAUNCH! Introduction to Managed Rules for AWS WAF (SID217) Best Practices for DDoS Mitigation on AWS Advanced Techniques for Securing Your Web Applications with AWS WAF and AWS Shield
  • 26. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Appendixes
  • 27. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Evolution of WAF & DDoS mitigation On-Premise Cloud-Routed Cloud-Native
  • 28. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. WebACL example Rule Allow, Count, Block Rate-Based Rule Count, Block Rule Allow, Count, Block Match Condition SQL injection Match Condition Cross-site scripting Match Condition Size constraint Match Condition IP addresses Managed Rules No override, Override to count WebACL WebACL Match Condition String and Regex Match Condition Geo match Rule Allow, Count, Block Rule Allow, Count, Block Rule Allow, Count, Block