Advertisement · 728 × 90
#
Hashtag
#AwsNetworkFirewall
Advertisement · 728 × 90
Preview
AWS Network Firewall now supports firewall state change notifications through Amazon EventBridge AWS Network Firewall now integrates with Amazon EventBridge to provide real-time notifications for firewall state changes and configuration updates. This new capability enables you to monitor critical firewall operations including firewall configuration updates and endpoint status modifications across your network security infrastructure. You gain immediate visibility into changes affecting AWS Managed Rules, Partner Managed Rules, and firewall configurations. With EventBridge integration, you gain enhanced visibility into your firewall operations in real-time. You can build automated workflows to send notifications through Amazon SNS, create tickets in your IT service management (ITSM) systems, or integrate with third-party security information and event management (SIEM) solutions. This integration helps you maintain better operational awareness of your network security infrastructure and respond quickly to configuration changes or potential issues. AWS Network Firewall state change notifications through Amazon EventBridge are available in all AWS Regions where AWS Network Firewall and Amazon EventBridge is currently available. To learn more about AWS Network Firewall EventBridge integration, visit the AWS Network Firewall documentation. For information about Amazon EventBridge, see the Amazon EventBridge documentation.

🆕 AWS Network Firewall uses Amazon EventBridge for real-time state change notifications, automating workflows for immediate network security updates and configurations visibility across supported regions.

#AWS #AwsNetworkFirewall

0 0 0 0
AWS Network Firewall now supports firewall state change notifications through Amazon EventBridge AWS Network Firewall now integrates with Amazon EventBridge to provide real-time notifications for firewall state changes and configuration updates. This new capability enables you to monitor critical firewall operations including firewall configuration updates and endpoint status modifications across your network security infrastructure. You gain immediate visibility into changes affecting AWS Managed Rules, Partner Managed Rules, and firewall configurations. With EventBridge integration, you gain enhanced visibility into your firewall operations in real-time. You can build automated workflows to send notifications through Amazon SNS, create tickets in your IT service management (ITSM) systems, or integrate with third-party security information and event management (SIEM) solutions. This integration helps you maintain better operational awareness of your network security infrastructure and respond quickly to configuration changes or potential issues. AWS Network Firewall state change notifications through Amazon EventBridge are available in all AWS Regions where AWS Network Firewall and Amazon EventBridge is currently available. To learn more about AWS Network Firewall EventBridge integration, visit the https://docs.aws.amazon.com/network-firewall/. For information about Amazon EventBridge, see the https://docs.aws.amazon.com/eventbridge/latest/ref/events-ref-network-firewall.html.

AWS Network Firewall now supports firewall state change notifications through Amazon EventBridge

AWS Network Firewall now integrates with Amazon EventBridge to provide real-time notifications for firewall state changes and configuration updates. This new capability en...

#AWS #AwsNetworkFirewall

0 0 0 0
Preview
🔐 TLS Encryption & Decryption in AWS Network Firewall Today, over 90% of internet traffic uses TLS (HTTPS). While this protects confidentiality, it also...

✍️ New blog post by sourav chakraborty

🔐 TLS Encryption & Decryption in AWS Network Firewall

#aws #awsnetworkfirewall #cloudsecurity #tls

0 0 0 0
AWS Network Firewall announces new price reductions https://aws.amazon.com/network-firewall/ has introduced two pricing improvements for customers. The service has added the hourly and data processing discounts on NAT Gateways that are service-chained with Network Firewall secondary endpoints. Additionally, AWS Network Firewall has removed additional data processing charges for Advanced Inspection, which enables Transport Layer Security (TLS) inspection of encrypted network traffic. Previously, NAT Gateway discounts were limited to primary Network Firewall endpoints, and customers paid additional data processing charges when using Advanced Inspection for TLS inspection in select AWS regions. With these improvements, the NAT Gateway discounts now apply when service-chained with both primary and secondary firewall endpoints. Customers also no longer pay the additional data processing charge for Advanced Inspection that ranged from $0.001/GB to $0.009/GB in 13 AWS regions: Middle East (Bahrain), Asia Pacific (Hong Kong), Asia Pacific (Tokyo), Asia Pacific (Osaka), Asia Pacific (Mumbai), EU (Milan), South America (São Paulo), US West (N. California), Africa (Cape Town), Asia Pacific (Seoul), Asia Pacific (Singapore), Asia Pacific (Sydney), and Asia Pacific (Melbourne). These changes help to reduce costs for architectures that use Network Firewall's multiple VPC endpoint capability and TLS inspection features. Multiple VPC endpoints allow you to connect 50 VPCs per Availability Zone to a single Network Firewall, helping to reduce operational complexity and lower costs as you protect more VPCs. By removing additional data processing charges when using Advanced Inspection, customers can now implement TLS inspection more cost-effectively across their network security architecture. These pricing improvements are available in all https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/ where Network Firewall is offered and are applied automatically to eligible configurations. No action is required from customers. To learn more, see AWS Network Firewall https://aws.amazon.com/network-firewall/pricing/ and the AWS Network Firewall service https://docs.aws.amazon.com/network-firewall/latest/developerguide/firewall-creating.html.

AWS Network Firewall announces new price reductions

https://aws.amazon.com/network-firewall/ has introduced two pricing improvements for customers. The service has added the hourly and data processing discounts on NAT Gateways that are service-chained with Network Fir...

#AWS #AwsNetworkFirewall

0 0 0 0
Preview
AWS Network Firewall announces new price reductions AWS Network Firewall has introduced two pricing improvements for customers. The service has added the hourly and data processing discounts on NAT Gateways that are service-chained with Network Firewall secondary endpoints. Additionally, AWS Network Firewall has removed additional data processing charges for Advanced Inspection, which enables Transport Layer Security (TLS) inspection of encrypted network traffic. Previously, NAT Gateway discounts were limited to primary Network Firewall endpoints, and customers paid additional data processing charges when using Advanced Inspection for TLS inspection in select AWS regions. With these improvements, the NAT Gateway discounts now apply when service-chained with both primary and secondary firewall endpoints. Customers also no longer pay the additional data processing charge for Advanced Inspection that ranged from $0.001/GB to $0.009/GB in 13 AWS regions: Middle East (Bahrain), Asia Pacific (Hong Kong), Asia Pacific (Tokyo), Asia Pacific (Osaka), Asia Pacific (Mumbai), EU (Milan), South America (São Paulo), US West (N. California), Africa (Cape Town), Asia Pacific (Seoul), Asia Pacific (Singapore), Asia Pacific (Sydney), and Asia Pacific (Melbourne). These changes help to reduce costs for architectures that use Network Firewall's multiple VPC endpoint capability and TLS inspection features. Multiple VPC endpoints allow you to connect 50 VPCs per Availability Zone to a single Network Firewall, helping to reduce operational complexity and lower costs as you protect more VPCs. By removing additional data processing charges when using Advanced Inspection, customers can now implement TLS inspection more cost-effectively across their network security architecture. These pricing improvements are available in all AWS regions where Network Firewall is offered and are applied automatically to eligible configurations. No action is required from customers. To learn more, see AWS Network Firewall pricing and the AWS Network Firewall service documentation.

🆕 AWS Network Firewall cuts costs with hourly and data processing discounts on NAT Gateways in 13 regions, removing extra charges for Advanced Inspection, aiding lower fees for TLS inspection and VPC endpoint use.

#AWS #AwsNetworkFirewall

0 0 0 0
AWS announces Flexible Cost Allocation in AWS GovCloud (US) https://aws.amazon.com/network-firewall/now supports flexible cost allocation through https://aws.amazon.com/transit-gateway/ native attachments in https://aws.amazon.com/govcloud-us/, enabling you to automatically distribute data processing costs across different AWS accounts. Customers can create metering policies to apply data processing charges based on their organization's chargeback requirements instead of consolidating all expenses in the firewall owner account. This capability helps security and network teams better manage centralized firewall costs by distributing charges to application teams based on actual usage. Organizations can now maintain centralized security controls while automatically allocating inspection costs to the appropriate business units or application owners, eliminating the need for custom cost management solutions. Flexible cost allocation is available in AWS GovCloud (US-East) and AWS GovCloud (US-West) Regions. You can enable these features using the AWS Management Console, AWS Command Line Interface (CLI) and the AWS Software Development Kit (SDK). There are no additional charges for using this attachment or flexible cost allocation beyond standard pricing of https://aws.amazon.com/network-firewall/pricing/ and https://aws.amazon.com/transit-gateway/pricing/. To get started, visit the Flexible Cost Allocation on AWS Transit Gateway service https://docs.aws.amazon.com/vpc/latest/tgw/metering-policy.html.

AWS announces Flexible Cost Allocation in AWS GovCloud (US)

https://aws.amazon.com/network-firewall/now supports flexible cost allocation through https://aws.amazon.com/transit-gateway/ native attachments in https://aws.amazon.com/govcloud-us/ enabling you to automat...

#AWS #AwsNetworkFirewall

0 0 0 0
Preview
AWS announces Flexible Cost Allocation in AWS GovCloud (US) AWS Network Firewall now supports flexible cost allocation through AWS Transit Gateway native attachments in AWS GovCloud (US) Regions, enabling you to automatically distribute data processing costs across different AWS accounts. Customers can create metering policies to apply data processing charges based on their organization's chargeback requirements instead of consolidating all expenses in the firewall owner account. This capability helps security and network teams better manage centralized firewall costs by distributing charges to application teams based on actual usage. Organizations can now maintain centralized security controls while automatically allocating inspection costs to the appropriate business units or application owners, eliminating the need for custom cost management solutions. Flexible cost allocation is available in AWS GovCloud (US-East) and AWS GovCloud (US-West) Regions. You can enable these features using the AWS Management Console, AWS Command Line Interface (CLI) and the AWS Software Development Kit (SDK). There are no additional charges for using this attachment or flexible cost allocation beyond standard pricing of AWS Network Firewall and AWS Transit Gateway. To get started, visit the Flexible Cost Allocation on AWS Transit Gateway service documentation.

🆕 AWS Network Firewall now supports cost allocation via AWS Transit Gateway in AWS GovCloud (US), distributing data costs across accounts without extra charges. Available in US-East and US-West, it lets you manage firewall costs by allocating inspection fees to business u…

#AWS #AwsNetworkFirewall

0 0 0 0
AWS Network Firewall now supports GenAI traffic visibility and enforcement with Web category-based filtering AWS Network Firewall now provides visibility into generative AI (GenAI) application traffic and supports traffic filtering based on web categories. This new capability simplifies governance by enabling you to identify and control access to GenAI services, social media platforms, streaming sites, and other web categories directly within your firewall rules using pre-defined URL categories. This approach of inspecting traffic based on URL categories helps security and compliance teams enforce consistent policies across their AWS environments while providing visibility into usage of emerging technologies like GenAI. You can now easily block access to inappropriate or high-risk domains, restrict GenAI tool usage to approved services, and meet regulatory requirements—all while reducing operational overhead. When combined with AWS Network Firewall's TLS inspection feature, you can inspect the full URL path using category-based rules for even more granular control. This feature is available in all AWS commercial regions where AWS Network Firewall is supported. To learn more about URL category filtering in AWS Network Firewall, visit AWS Network Firewall https://aws.amazon.com/network-firewall/ and service https://docs.aws.amazon.com/network-firewall/. You can get started by updating your stateful rule groups in the AWS Management Console, AWS CLI, or AWS SDKs. https://aws.amazon.com

AWS Network Firewall now supports GenAI traffic visibility and enforcement with Web category-based filtering

AWS Network Firewall now provides visibility into generative AI (GenAI) application traffic and supports traffic filtering based on web categories. This new ca...

#AWS #AwsNetworkFirewall

0 0 0 0
Preview
AWS Network Firewall now supports GenAI traffic visibility and enforcement with Web category-based filtering AWS Network Firewall now provides visibility into generative AI (GenAI) application traffic and supports traffic filtering based on web categories. This new capability simplifies governance by enabling you to identify and control access to GenAI services, social media platforms, streaming sites, and other web categories directly within your firewall rules using pre-defined URL categories. This approach of inspecting traffic based on URL categories helps security and compliance teams enforce consistent policies across their AWS environments while providing visibility into usage of emerging technologies like GenAI. You can now easily block access to inappropriate or high-risk domains, restrict GenAI tool usage to approved services, and meet regulatory requirements—all while reducing operational overhead. When combined with AWS Network Firewall's TLS inspection feature, you can inspect the full URL path using category-based rules for even more granular control. This feature is available in all AWS commercial regions where AWS Network Firewall is supported. To learn more about URL category filtering in AWS Network Firewall, visit AWS Network Firewall product page and service documentation. You can get started by updating your stateful rule groups in the AWS Management Console, AWS CLI, or AWS SDKs.

🆕 AWS Network Firewall now offers GenAI traffic visibility and enforcement via web category-based filtering, simplifying governance and compliance by blocking inappropriate domains and restricting GenAI tool usage, available in all commercial regions.

#AWS #AwsNetworkFirewall

0 0 0 0
Introducing AWS Network Firewall Proxy in preview AWS introduces Network Firewall Proxy in public preview. You can use it to exert centralized controls against data exfiltration and malware injection. You can set up your Network Firewall Proxy in explicit mode in just a few clicks and filter the traffic going out from your applications and the response that these applications receive. Network Firewall Proxy enables customers to efficiently manage and secure web and inter-network traffic. It protects your organization against atempts to spoof the domain name or the server name index (SNI) and offers flexibility to set fine-grained access controls. You can use Network Firewall Proxy to restrict access from your applications to trusted domains or IP addresses, or block unintended response from external servers. You can also turn on TLS inspection and set granular filtering controls on HTTP header attributes. Your Network Firewall Proxy offers comprehensive logs for monitoring your applications. You can enable them and send to Amazon S3 and AWS CloudWatch for detailed analyses and audit. Try out AWS Network Firewall Proxy in your test environment today in US East (Ohio) region. Proxy is available for free during public preview. For more information check https://aws.amazon.com/network-firewall/.

Introducing AWS Network Firewall Proxy in preview

AWS introduces Network Firewall Proxy in public preview. You can use it to exert centralized controls against data exfiltration and malware injection. You can set up your Network Firewall Proxy in explicit mode in just...

#AWS #AwsNetworkFirewall

0 0 0 0
Preview
Introducing AWS Network Firewall Proxy in preview AWS introduces Network Firewall Proxy in public preview. You can use it to exert centralized controls against data exfiltration and malware injection. You can set up your Network Firewall Proxy in explicit mode in just a few clicks and filter the traffic going out from your applications and the response that these applications receive. Network Firewall Proxy enables customers to efficiently manage and secure web and inter-network traffic. It protects your organization against atempts to spoof the domain name or the server name index (SNI) and offers flexibility to set fine-grained access controls. You can use Network Firewall Proxy to restrict access from your applications to trusted domains or IP addresses, or block unintended response from external servers. You can also turn on TLS inspection and set granular filtering controls on HTTP header attributes. Your Network Firewall Proxy offers comprehensive logs for monitoring your applications. You can enable them and send to Amazon S3 and AWS CloudWatch for detailed analyses and audit. Try out AWS Network Firewall Proxy in your test environment today in US East (Ohio) region. Proxy is available for free during public preview. For more information check AWS Network Firewall proxy documentation.

🆕 AWS Network Firewall Proxy preview provides centralized controls to stop data theft and malware. Easy setup, traffic filtering, web/inter-network management, spoof protection, access controls, and logs. Free in US East (Ohio). Try it!

#AWS #AwsNetworkFirewall

1 0 0 0
AWS Network Firewall now supports flexible cost allocation via Transit Gateway https://aws.amazon.com/network-firewall/now supports flexible cost allocation through https://aws.amazon.com/transit-gateway/ native attachments, enabling you to automatically distribute data processing costs across different AWS accounts. Customers can create metering policies to apply data processing charges based on their organization's chargeback requirements instead of consolidating all expenses in the firewall owner account. This capability helps security and network teams better manage centralized firewall costs by distributing charges to application teams based on actual usage. Organizations can now maintain centralized security controls while automatically allocating inspection costs to the appropriate business units or application owners, eliminating the need for custom cost management solutions. Flexible cost allocation is available in all https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/ and Amazon China Regions where both AWS Network Firewall and Transit Gateway attachments are supported. There are no additional charges for using this attachment or flexible cost allocation beyond standard pricing of https://aws.amazon.com/network-firewall/pricing/ and https://aws.amazon.com/transit-gateway/pricing/. To learn more, visit the AWS Network Firewall service https://docs.aws.amazon.com/network-firewall/latest/developerguide/firewall-creating.html.

AWS Network Firewall now supports flexible cost allocation via Transit Gateway


https://aws.amazon.com/network-firewall/now supports flexible cost allocation through https://aws.amazon.com/transit-gateway/ native attachments, enabling you to automatically distribute...

#AWS #AwsNetworkFirewall

1 0 0 0
Preview
AWS Network Firewall now supports flexible cost allocation via Transit Gateway AWS Network Firewall now supports flexible cost allocation through AWS Transit Gateway native attachments, enabling you to automatically distribute data processing costs across different AWS accounts. Customers can create metering policies to apply data processing charges based on their organization's chargeback requirements instead of consolidating all expenses in the firewall owner account. This capability helps security and network teams better manage centralized firewall costs by distributing charges to application teams based on actual usage. Organizations can now maintain centralized security controls while automatically allocating inspection costs to the appropriate business units or application owners, eliminating the need for custom cost management solutions. Flexible cost allocation is available in all AWS Commercial Regions and Amazon China Regions where both AWS Network Firewall and Transit Gateway attachments are supported. There are no additional charges for using this attachment or flexible cost allocation beyond standard pricing of AWS Network Firewall and AWS Transit Gateway. To learn more, visit the AWS Network Firewall service documentation.

🆕 AWS Network Firewall now supports cost allocation via Transit Gateway, spreading data processing costs across accounts. This helps manage centralized firewall costs based on usage, available in all regions with no extra charges beyond standard pricing.

#AWS #AwsNetworkFirewall

1 0 0 0
AWS Network Firewall Now Supports Managed Rules from AWS Partners available in AWS Marketplace AWS Network Firewall now supports managed rules from AWS Partners, enabling you to deploy expert-curated, automatically updated security rules from AWS Partners directly within your network firewall policies. This new capability allows you to integrate pre-configured rule groups into your AWS Network Firewall with just a few clicks through the AWS Network Firewall console. Managed rules are maintained by AWS Partners who continuously update them to address emerging threats, providing comprehensive protection without the operational overhead of managing custom rules. You can subscribe to managed rules from AWS Partners either from the AWS Network Firewall console, or from the AWS Marketplace website. Subscriptions to these rules will provide you the same benefits as any other product in AWS Marketplace, including consolidated billing and lower pricing for long-term contracts. You can simplify security operations by deploying specialized rule groups tailored to different industry needs, compliance requirements, and threat landscapes. This reduces the time your security teams spend researching, creating, and maintaining custom security rules, while ensuring your protections stay current against evolving threats. Managed rules for AWS Network Firewall are available from AWS Marketplace sellers of Check Point, Fortinet, Infoblox, Lumen, Rapid7, ThreatSTOP, and Trend Micro, in all AWS commercial regions where AWS Network Firewall and AWS Marketplace is available. To get started, visit the AWS Network Firewall console or browse available managed rules in https://aws.amazon.com/marketplace. For more information, see the AWS Network Firewall https://aws.amazon.com/network-firewall/ and the service https://docs.aws.amazon.com/network-firewall/latest/developerguide/.

AWS Network Firewall Now Supports Managed Rules from AWS Partners available in AWS Marketplace

AWS Network Firewall now supports managed rules from AWS Partners, enabling you to deploy expert-curated, automatically updated security rules from AWS Partn...

#AWS #AwsNetworkFirewall #AwsMarketplace

1 0 0 0
Active threat defense now enabled by default in AWS Network Firewall Starting today, AWS Network Firewall enables active threat defense by default in alert mode when you create new firewall policies in the AWS Management Console. Active threat defense provides automated, intelligence-driven protection against dynamic, ongoing threat activities observed across AWS infrastructure. With this default setting you get visibility into threat activity and indicator groups, types, and threat names you are protected against. You can switch to block mode to automatically prevent suspicious traffic, such as command-and-control (C2) communication, embedded URLs, and malicious domains, or disable the feature entirely. AWS verifies threat indicators to ensure high accuracy and minimize false positives. Active threat defense is available in all regions where AWS Network Firewall is available, including AWS GovCloud (US) and China Regions. To learn more about active threat defense and pricing, see the AWS Network Firewall https://aws.amazon.com/network-firewall/ and https://docs.aws.amazon.com/network-firewall/latest/developerguide/aws-managed-rule-groups-atd.html.

Active threat defense now enabled by default in AWS Network Firewall

Starting today, AWS Network Firewall enables active threat defense by default in alert mode when you create new firewall policies in the AWS Management Console. Active threat defense p...

#AWS #AwsGovcloudUs #AwsNetworkFirewall

2 1 0 0
Preview
Active threat defense now enabled by default in AWS Network Firewall Starting today, AWS Network Firewall enables active threat defense by default in alert mode when you create new firewall policies in the AWS Management Console. Active threat defense provides automated, intelligence-driven protection against dynamic, ongoing threat activities observed across AWS infrastructure. With this default setting you get visibility into threat activity and indicator groups, types, and threat names you are protected against. You can switch to block mode to automatically prevent suspicious traffic, such as command-and-control (C2) communication, embedded URLs, and malicious domains, or disable the feature entirely. AWS verifies threat indicators to ensure high accuracy and minimize false positives. Active threat defense is available in all regions where AWS Network Firewall is available, including AWS GovCloud (US) and China Regions. To learn more about active threat defense and pricing, see the AWS Network Firewall product page and documentation.

🆕 AWS Network Firewall defaults to active threat defense in alert mode, offering smart threat protection. Switch to block mode or disable. Available globally, verified threats reduce false positives. For more, see AWS Network Firewall page.

#AWS #AwsGovcloudUs #AwsNetworkFirewall

1 0 0 0
AWS Network Firewall is now available in the AWS New Zealand (Auckland) region Starting today, AWS Network Firewall is available in the AWS New Zealand (Auckland) Region, enabling customers to deploy essential network protections for all their Amazon Virtual Private Clouds (VPCs). AWS Network Firewall is a managed firewall service that is easy to deploy. The service automatically scales with network traffic volume to provide high-availability protections without the need to set up and maintain the underlying infrastructure. It is integrated with AWS Firewall Manager to provide you with central visibility and control over your firewall policies across multiple AWS accounts. To see which regions AWS Network Firewall is available in, visit the https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/. For more information, please see the AWS Network Firewall https://aws.amazon.com/network-firewall/ and the service https://docs.aws.amazon.com/network-firewall/latest/developerguide/.

AWS Network Firewall is now available in the AWS New Zealand (Auckland) region

Starting today, AWS Network Firewall is available in the AWS New Zealand (Auckland) Region, enabling customers to deploy essential network protections for all their Amazon Virtual Private C...

#AWS #AwsNetworkFirewall

1 0 0 0
Preview
AWS Network Firewall is now available in the AWS New Zealand (Auckland) region Starting today, AWS Network Firewall is available in the AWS New Zealand (Auckland) Region, enabling customers to deploy essential network protections for all their Amazon Virtual Private Clouds (VPCs). AWS Network Firewall is a managed firewall service that is easy to deploy. The service automatically scales with network traffic volume to provide high-availability protections without the need to set up and maintain the underlying infrastructure. It is integrated with AWS Firewall Manager to provide you with central visibility and control over your firewall policies across multiple AWS accounts. To see which regions AWS Network Firewall is available in, visit the AWS Region Table. For more information, please see the AWS Network Firewall product page and the service documentation.

🆕 AWS Network Firewall now available in New Zealand (Auckland) region for easy deployment and automatic scaling of network protections for Amazon VPCs, integrated with AWS Firewall Manager for centralized policy control.

#AWS #AwsNetworkFirewall

1 0 0 0
AWS Network Firewall adds Reject and Alert actions for stateful domain list rule groups Today, AWS Network Firewall introduces Reject and Alert action support for stateful domain list rule groups, providing customers with more granular control over their network traffic. This enhancement allows customers to create Reject and Alert actions in stateful domain list rule groups using the AWS Network Firewall console, offering more flexible and precise traffic management options within their AWS environments. With this new feature, customers can now create more sophisticated and tailored network security policies. The Reject action enables customers to block specific domain-based traffic, while the Alert action allows for monitoring and logging of traffic without interrupting the flow. This granular control helps organizations improve their security posture by fine-tuning their firewall rules to better align with their specific security requirements and compliance needs. The new Reject and Alert action support for stateful domain list rule groups is available in all AWS Regions where AWS Network Firewall is offered. You can enable TLS inspection from the https://console.aws.amazon.com/vpc/ or the https://docs.aws.amazon.com/network-firewall/latest/APIReference/ To learn more about this new feature and other AWS Network Firewall capabilities, visit the AWS Network Firewall https://aws.amazon.com/network-firewall/ and the service https://docs.aws.amazon.com/network-firewall/latest/developerguide/. 

AWS Network Firewall adds Reject and Alert actions for stateful domain list rule groups

Today, AWS Network Firewall introduces Reject and Alert action support for stateful domain list rule groups, providing customers with more granular control over their network traff...

#AWS #AwsNetworkFirewall

1 0 0 0
Preview
AWS Network Firewall adds Reject and Alert actions for stateful domain list rule groups Today, AWS Network Firewall introduces Reject and Alert action support for stateful domain list rule groups, providing customers with more granular control over their network traffic. This enhancement allows customers to create Reject and Alert actions in stateful domain list rule groups using the AWS Network Firewall console, offering more flexible and precise traffic management options within their AWS environments. With this new feature, customers can now create more sophisticated and tailored network security policies. The Reject action enables customers to block specific domain-based traffic, while the Alert action allows for monitoring and logging of traffic without interrupting the flow. This granular control helps organizations improve their security posture by fine-tuning their firewall rules to better align with their specific security requirements and compliance needs. The new Reject and Alert action support for stateful domain list rule groups is available in all AWS Regions where AWS Network Firewall is offered. You can enable TLS inspection from the Amazon VPC Console or the Network Firewall API To learn more about this new feature and other AWS Network Firewall capabilities, visit the AWS Network Firewall product page and the service documentation.

🆕 AWS Network Firewall adds Reject and Alert actions for stateful domain lists, boosting traffic control and security in AWS. Available globally, it blocks and monitors specific domains without interruptions.

#AWS #AwsNetworkFirewall

0 0 0 0
AWS Network Firewall enhances application layer traffic controls https://aws.amazon.com/network-firewall/, a managed service that makes it easy to deploy essential network protections for your Amazon VPCs, now provides enhanced default rules to handle TLS client hellos, and HTTP requests split across multiple packets. This update introduces new application layer drop and alert established default stateful actions, enabling customers to maintain security controls while supporting modern TLS implementations and large HTTP requests. These enhancements help customers implement robust security policies without writing complex custom rules. Security teams can now effectively inspect and filter traffic where key information is segmented across multiple packets, while maintaining visibility through detailed logging options, making it easier to secure applications using modern protocols and encryption standards. This capability is available in all https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/ where AWS Network Firewall is supported. To learn more, refer to AWS Network Firewall service https://docs.aws.amazon.com/network-firewall/.

AWS Network Firewall enhances application layer traffic controls

https://aws.amazon.com/network-firewall/ a managed service that makes it easy to deploy essential network protections for your Amazon VPCs, now provides enhanced default rules to handle TLS client hello...

#AWS #AwsNetworkFirewall

1 0 0 0
Preview
AWS Network Firewall enhances application layer traffic controls AWS Network Firewall, a managed service that makes it easy to deploy essential network protections for your Amazon VPCs, now provides enhanced default rules to handle TLS client hellos, and HTTP requests split across multiple packets. This update introduces new application layer drop and alert established default stateful actions, enabling customers to maintain security controls while supporting modern TLS implementations and large HTTP requests. These enhancements help customers implement robust security policies without writing complex custom rules. Security teams can now effectively inspect and filter traffic where key information is segmented across multiple packets, while maintaining visibility through detailed logging options, making it easier to secure applications using modern protocols and encryption standards. This capability is available in all AWS Regions where AWS Network Firewall is supported. To learn more, refer to AWS Network Firewall service documentation.

🆕 AWS Network Firewall now offers enhanced default rules for TLS and HTTP traffic, introducing new drop/alert actions for better security without custom rules, available in all supported regions. For details, see the AWS Network Firewall documentation.

#AWS #AwsNetworkFirewall

1 0 0 0
AWS Network Firewall enhances console, monitoring, and security features AWS Network Firewall now offers enhancements to its console, monitoring dashboard, and security controls. These improvements include expanded monitoring insights and advanced TLS Inspection features. These updates provide customers with enhanced visibility into their firewall's performance and stronger security measures for outbound connections. The monitoring dashboard now provides deeper insights into traffic going to AWS services such as Amazon S3, Amazon DynamoDB, and AWS Backup, which can be sent over PrivateLink endpoints. The dashboard also gives visibility into top source and destination IP addresses based on packets and bytes processed. Customers can filter the dashboard based on IP addresses and protocol, enabling more targeted analysis of network traffic patterns. To further strengthen security, AWS Network Firewall has introduced session holding for TLS Inspection. This feature prevents any TCP and TLS establishment packets from reaching destination servers until TLS protocol rules matching on Server Name Indication (SNI) have been evaluated. This enhancement provides stronger security controls for outbound traffic and helps protect against connections to potentially malicious targets. These new features are available in all AWS Regions where AWS Network Firewall is offered. To learn more about these new features and other AWS Network Firewall capabilities, visit the AWS Network Firewall https://aws.amazon.com/network-firewall/ and the service https://docs.aws.amazon.com/network-firewall/latest/developerguide/. 

AWS Network Firewall enhances console, monitoring, and security features

AWS Network Firewall now offers enhancements to its console, monitoring dashboard, and security controls. These improvements include expanded monitoring insights and advanced TLS Inspection featu...

#AWS #AwsNetworkFirewall

1 0 0 0
Preview
AWS Network Firewall enhances console, monitoring, and security features AWS Network Firewall now offers enhancements to its console, monitoring dashboard, and security controls. These improvements include expanded monitoring insights and advanced TLS Inspection features. These updates provide customers with enhanced visibility into their firewall's performance and stronger security measures for outbound connections. The monitoring dashboard now provides deeper insights into traffic going to AWS services such as Amazon S3, Amazon DynamoDB, and AWS Backup, which can be sent over PrivateLink endpoints. The dashboard also gives visibility into top source and destination IP addresses based on packets and bytes processed. Customers can filter the dashboard based on IP addresses and protocol, enabling more targeted analysis of network traffic patterns. To further strengthen security, AWS Network Firewall has introduced session holding for TLS Inspection. This feature prevents any TCP and TLS establishment packets from reaching destination servers until TLS protocol rules matching on Server Name Indication (SNI) have been evaluated. This enhancement provides stronger security controls for outbound traffic and helps protect against connections to potentially malicious targets. These new features are available in all AWS Regions where AWS Network Firewall is offered. To learn more about these new features and other AWS Network Firewall capabilities, visit the AWS Network Firewall product page and the service documentation.

🆕 AWS Network Firewall boosts console, monitoring, and security with enhanced insights, advanced TLS Inspection, and session holding for stronger outbound traffic protection, available in all regions.

#AWS #AwsNetworkFirewall

2 0 0 0
AWS Weekly Roundup: New AWS Heroes, Amazon Q Developer, EC2 GPU price reduction, and more (June 9, 2025) The AWS Heroes program recognizes a vibrant, worldwide group of AWS experts whose enthusiasm for knowledge-sharing has a real impact within the community. Heroes go above and beyond to share knowledge in a variety of ways in developer community. We introduce our newest AWS Heroes in the second quarter of 2025. To find and connect […]

AWS Weekly Roundup: New AWS Heroes, Amazon Q Developer, EC2 GPU price reduction, and more (June 9, 2025)

The AWS Heroes progr...

#AWS #AmazonApiGateway #AmazonAthena #AmazonEc2 #AmazonElasticKubernetesService #AmazonQDeveloper #Announcements #AwsHeroes #AwsNetworkFirewall #Graviton #WeekInReview

0 0 0 0
AWS Network Firewall launches support for active threat defense AWS Network Firewall now offers active threat defense, a new security feature that helps you protect your Amazon Virtual Private Cloud (VPC) workloads against threat activities observed across AWS global infrastructure using Amazon threat intelligence. AWS Network Firewall with active threat defense provides automated, intelligence-driven protection against dynamic, ongoing threat activities observed across AWS infrastructure. Once enabled, you can configure the managed rule group in your firewall policy to automatically block suspicious traffic, such as command-and-control (C2) communication, embedded URLs, and malicious domains. The feature provides protection by continuously updating rules based on current threat activity. AWS Network Firewall offers improved visibility for active threat defense rule group, allowing you to see indicator groups, types and threat names you're protected against. If you are also an Amazon GuardDuty customer, related threat intelligence findings are marked with the threat list name “Amazon Active Threat Defense” going forward. These active threats can be automatically blocked by using the active threat defense managed rule group on AWS Network Firewall. To get started with AWS Network Firewall with active threat defense, visit the AWS Network Firewall console or refer to our https://docs.aws.amazon.com/network-firewall/latest/developerguide/aws-managed-rule-groups-atd.html. This feature is supported in all https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/ where AWS Network Firewall is available today, including the AWS GovCloud (US) Regions and China Regions. For more information about AWS Network Firewall and its features, please visit the AWS Network Firewall product page https://docs.aws.amazon.com/network-firewall/latest/developerguide/nwfw-atd-managed-rule-groups.html.

AWS Network Firewall launches support for active threat defense

AWS Network Firewall now offers active threat defense, a new security feature that helps you protect your Amazon Virtual Private Cloud (VPC) workloads against threat activities observed acr...

#AWS #AwsGovcloudUs #AwsNetworkFirewall

1 0 0 0
Preview
AWS Network Firewall launches support for active threat defense AWS Network Firewall now offers active threat defense, a new security feature that helps you protect your Amazon Virtual Private Cloud (VPC) workloads against threat activities observed across AWS global infrastructure using Amazon threat intelligence. AWS Network Firewall with active threat defense provides automated, intelligence-driven protection against dynamic, ongoing threat activities observed across AWS infrastructure. Once enabled, you can configure the managed rule group in your firewall policy to automatically block suspicious traffic, such as command-and-control (C2) communication, embedded URLs, and malicious domains. The feature provides protection by continuously updating rules based on current threat activity. AWS Network Firewall offers improved visibility for active threat defense rule group, allowing you to see indicator groups, types and threat names you're protected against. If you are also an Amazon GuardDuty customer, related threat intelligence findings are marked with the threat list name “Amazon Active Threat Defense” going forward. These active threats can be automatically blocked by using the active threat defense managed rule group on AWS Network Firewall. To get started with AWS Network Firewall with active threat defense, visit the AWS Network Firewall console or refer to our documentation. This feature is supported in all AWS Regions where AWS Network Firewall is available today, including the AWS GovCloud (US) Regions and China Regions. For more information about AWS Network Firewall and its features, please visit the AWS Network Firewall product page AWS Network Firewall.

🆕 AWS Network Firewall adds active threat defense to protect VPC workloads using Amazon threat intelligence, blocking suspicious traffic and updating rules based on current threats. Available in all AWS Regions.

#AWS #AwsGovcloudUs #AwsNetworkFirewall

0 0 0 0
AWS Network Firewall now supports AWS Transit Gateway native integration https://aws.amazon.com/network-firewall/ now supports native integration with https://aws.amazon.com/transit-gateway/ for simplified deployment and management of network security across your global AWS infrastructure. This capability is available in 5 AWS Regions, allowing customers to implement security controls more efficiently. AWS Transit Gateway interconnects your Amazon Virtual Private Clouds (VPCs) and on-premises networks, while AWS Network Firewall provides comprehensive security controls for those VPCs. Native attachment simplifies connecting these services, providing centralized security control without complex VPC configurations. Additionally, you can configure one or multiple Availability Zones (AZs) for high availability, maintaining traffic flow within the same AZ. This integration is available in the following https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/: Africa (Cape Town), Asia Pacific (Hyderabad), Europe (Stockholm), Europe (Zurich), and Middle East (UAE). There are no additional charges for this native integration beyond standard pricing of https://aws.amazon.com/network-firewall/pricing/ and https://aws.amazon.com/transit-gateway/pricing/. To get started, visit the AWS Network Firewall service https://docs.aws.amazon.com/network-firewall/latest/developerguide/firewall-creating.html.  

AWS Network Firewall now supports AWS Transit Gateway native integration

https://aws.amazon.com/network-firewall/ now supports native integration with https://aws.amazon.com/transit-gateway/ for simplified deployment and management of network securi...

#AWS #AwsNetworkFirewall #AwsTransitGateway

1 0 0 0
Preview
AWS Network Firewall now supports AWS Transit Gateway native integration AWS Network Firewall now supports native integration with AWS Transit Gateway for simplified deployment and management of network security across your global AWS infrastructure. This capability is available in 5 AWS Regions, allowing customers to implement security controls more efficiently. AWS Transit Gateway interconnects your Amazon Virtual Private Clouds (VPCs) and on-premises networks, while AWS Network Firewall provides comprehensive security controls for those VPCs. Native attachment simplifies connecting these services, providing centralized security control without complex VPC configurations. Additionally, you can configure one or multiple Availability Zones (AZs) for high availability, maintaining traffic flow within the same AZ. This integration is available in the following AWS Regions: Africa (Cape Town), Asia Pacific (Hyderabad), Europe (Stockholm), Europe (Zurich), and Middle East (UAE). There are no additional charges for this native integration beyond standard pricing of AWS Network Firewall and AWS Transit Gateway. To get started, visit the AWS Network Firewall service documentation.

🆕 AWS Network Firewall now integrates natively with AWS Transit Gateway in 5 regions for simplified global network security, offering high availability and no extra charges beyond standard pricing.

#AWS #AwsNetworkFirewall #AwsTransitGateway

1 0 0 0
AWS Weekly Roundup: New AWS Heroes, Amazon Q Developer, EC2 GPU price reduction, and more (June 9, 2025) The AWS Heroes program recognizes a vibrant, worldwide group of AWS experts whose enthusiasm for knowledge-sharing has a real impact within the community. Heroes go above and beyond to share knowledge in a variety of ways in developer community. We introduce our newest AWS Heroes in the second quarter of 2025. To find and connect […]

AWS Weekly Roundup: New AWS Heroes, Amazon Q Developer, EC2 GPU price reduction, and more (June 9, 2025)

The AWS Heroes progr...

#AWS #AmazonApiGateway #AmazonAthena #AmazonEc2 #AmazonElasticKubernetesService #AmazonQDeveloper #Announcements #AwsHeroes #AwsNetworkFirewall #Graviton #WeekInReview

1 0 1 0