Language
English
日本語
한국어
中文
Includes AWS WAF managed rules where uses don’t have to create custom rules, provides protection against exploitation of a wide range of common application vulnerabilities or other unwanted traffic.
Creates two specific AWS WAF rules that allow you to manually insert IP addresses that you want to block or allow. You can also configure IP retention and remove expired IP addresses from these IP lists.
protect against common SQL injection or XSS patterns in the URI, query string, or body of a request. Helps protect against attacks that consist of a large number of requests from a particular IP address, such as a web-layer distributed denial-of-service (DDoS) attacks or a brute-force login attempt.
This component parses application access logs searching for suspicious behavior, such as an abnormal amount of errors generated by an origin. It then blocks those suspicious source IP addresses for a customer-defined period of time.
Automatically sets up a honeypot, which is a security mechanism intended to lure and deflect an attempted attack.
Ultilize existing Security Automations for AWS WAF solution or build your own WAF rule set.
The solution configures two native AWS WAF rules that are designed to protect against common SQL injection or XSS patterns in the URI, query string, or body of a request.
The AWS CloudFormation template automatically launches and configures the AWS WAF settings and protective features that you choose to include during initial deployment.
When activated, AWS CloudFormation provisions an Amazon Athena query and a scheduled AWS Lambda function responsible for orchestrating Athena executing, processing result output, and updating AWS WAF.