Virtual Private Cloud Security (AWS VPC)
Basic of VPC's
SG
NACLs
Routing
AWS PrivateLink
AWS Transit Gateway
VPC Flow Logs
Traffic Mirroring
VPC Reachability Analyzer
Anti-DDoS (AWS Shield)
Shield Standard (free)
Basic L3 & 4 protection
Network layer
Transport layer
Detections
Detection logic for infrastructure layer threats
Detection logic for multiple resources in an application
DDoS detection vectors
Shield Advanced (paid/premium)
Sheild Advanced - features
Detection logic for application layer threats
Amazon CloudFront distributions.
Amazon Route 53 hosted zones.
AWS Global Accelerator standard accelerators.
Amazon EC2 Elastic IP addresses. Shield Advanced protects the resources that are associated with protected Elastic IP addresses.
Amazon EC2 instances, through association to Amazon EC2 Elastic IP addresses.
The following Elastic Load Balancing (ELB) load balancers:
Application Load Balancers.
Classic Load Balancers.
Network Load Balancers, through associations to Amazon EC2 Elastic IP addresses.
Shield Advanced Capabilities and options
AWS WAF integration (at no extra cost)
AWS Firewall Manager integration (at no extra cost)
Automatic application layer DDoS mitigation
Health-based detection
Protection groups
Enhanced visibility into DDoS events and attacks
Centralized management of Shield Advanced protections by AWS Firewall Manager
AWS Shield Response Team (SRT)
AWS WAF log analysis and rules
Build custom network mitigations
Network traffic engineering
Architectural recommendations
Proactive Engagement (15min)
Cost protection opportunities
When to choose Shield Advanced
Applications
Resources
Side by side table
Security with AWS Shield
Documentation
Pricing
Web App Protection (AWS WAF)
Documentation
Sample input rule criteria
Scripts that are likely to be malicious (example known as cross-site scripting (XSS)
IP addresses or address ranges that requests originate from
Country or geographical location that requests originate from
Length of a specified part of the request, such as the query string
SQL code that is likely to be malicious (example known as SQL injection)
Strings that appear in the request (support for regex)
Labels that prior rules in the web ACL have added to the request
Features
Monitors HTTPS
Amazon CloudFront
AWS Application Load Balancer
AWS API Gateway
AWS AppSync GraphQL API
Controls access to content
Web ACL's
Rules
Rules groups
Web request body inspection
Protect applications on Amazon ECS
Customized web requests and responses
Allow, count, CAPTCHA, block
Labels on web requests
Managed protections
Bot Control
Fraud Control (acount takeover prevention - ATP)
Client application integration
CAPTCHA
Logging web ACL traffic
CloudWatch Logs
Amazon S3 buckets
Kinesis Data Firehose
Getting started with AWS WAF
Security in AWS WAF
Layer 7 network firewall + IPS (AWS Network Firewall)
Use cases
Filter inbound Internet traffic
Filter outbound traffic
VPC to VPC traffic
Secure AWS Direct Connect and VPN traffic
Filters both network and application layer traffic
Features
High availability and automated scaling
Stateful firewall
To/from outside of VPC
Transit Gateway
Site-to-site VPN
AWS Direct Connect
Internet Gateway
Policies
IP
Port
Protocol
Domain
Pattern matching
Includes match setting for traffic direction
To/from inside of VPC
Private Subnets
Public Subnets
Web filtering
SNI
FQDN
Alert and flow logs
Amazon S3
Amazon Kinesis
Amazon CloudWatch
Logging and Monitoring
Central management and visibility
Integration with AWS Firewall Manager
Intrusion prevention system (IPS)
Internal/in-house
Open source platforms
3rd party vendors
Suricata User Guide
Diverse ecosystem of partner integrations
Partners
Security in AWS Network Firewall
Getting started with AWS Network Firewall
FAQ's
Documentation
DNS Firewall (Route 53 Resolver DNS Firewall)
Features
VPC-outbound DNS (domain-based) filtering/protection
Allow/alert/block particular domains
Block DNS resolution in private hosted zones
Block/allow requests for Amazon EC2
Complements AWS Network Firewall for domain name filtering (which does not has visibility into queries made by Route 53 Resolver)
Monitor activity with logs and metrics
Integrated within AWS Firewall Manager
Enabling Route 53 Resolver DNS Firewall protections for your VPC
Security in Amazon Route 53
Amazon Route 53 Documentation
Management and aggregation (AWS Firewall Manager)
Features
Automatically deploy
Amazon VPC Security Rules
AWS WAF rules
AWS Shield Advanced protections
AWS Network Firewall rules
Amazon Route 53 DNS Firewall rules
Integrated with AWS Organizations
By Account
By Resource Type
By Tag
Cross-account protection policies
Dashboard with compliance notifications
Audit existing and future security groups in your VPCs
AWS Firewall Manager findings
AWS Security Hub
Finding types
AWS WAF policy findings
AWS Shield Advanced policy findings
Security group common policy findings
Security group content audit policy findings
Security group usage audit policy findings
Amazon Route 53 Resolver DNS Firewall policy findings
Getting started with AWS Firewall Manager
Security in AWS Firewall Manager
AWS Firewall Manager FAQ's
Documentation