Advertisement · 728 × 90
#
Hashtag
#AwsWaf
Advertisement · 728 × 90
AWS WAF announces Web Bot Auth support Today, we're excited to announce the addition of Web Bot Auth (WBA) support in AWS WAF, providing a secure and standardized way to authenticate legitimate AI agents and automated tools accessing web applications. This new capability helps distinguish trusted bot traffic from potentially harmful automated access attempts. Web Bot Auth is an authentication method that leverages cryptographic signatures in HTTP messages to verifythat a request comes from an automated bot. Web Bot Auth is used as a verification method for verified bots and signed agents. It relies on two active IETF drafts: a directory draft allowing the crawler to share their public keys, and a protocol draft defining how these keys should be used to attach crawler's identity to HTTP requests. AWS WAF now automatically allows verified AI agent traffic Verified WBA bots will now be automatically allowed by default, previously Category AI blocked unverified bots, this behavior is now refined to respect WBA verification. To learn more, please review the https://docs.aws.amazon.com/waf/latest/developerguide/waf-bot-control.html.

AWS WAF announces Web Bot Auth support

Today, we're excited to announce the addition of Web Bot Auth (WBA) support in AWS WAF, providing a secure and standardized way to authenticate legitimate AI agents and automated tools accessing web applications. This new capability helps di...

#AWS #AwsWaf

1 0 0 0
AWS announces flat-rate pricing plans for website delivery and security Amazon Web Services (AWS) is launching flat-rate pricing plans with no overages for website delivery and security. The flat-rate plans, available with Amazon CloudFront, combine global content delivery with AWS WAF, DDoS protection, Amazon Route 53 DNS, Amazon CloudWatch Logs ingestion, and serverless edge compute into a simple monthly price with no overage charges. Each plan also includes monthly Amazon S3 storage credits to help offset your storage costs. CloudFront flat-rate plans allow you to deliver your websites and applications without calculating costs across multiple AWS services. You won’t face the risk of overage charges, even if your website or application goes viral or faces a DDoS attack. Security features like WAF and DDoS protection are enabled by default, and additional configurations are simple to set up. When you serve your AWS applications through CloudFront instead of directly to the internet, your flat-rate plan covers the data transfer costs between your applications and your viewers for a simple monthly price without the worry of overages. This simplified pricing model is available alongside pay-as-you-go pricing for each CloudFront distribution, giving you the flexibility to choose the right pricing model and feature set for each application. Plans are available in Free ($0/month), Pro ($15/month), Business ($200/month), and Premium ($1,000/month) tiers for new and existing CloudFront distributions. Select the plan tier with the features and usage allowances matching your application’s needs. To learn more, refer to the https://aws.amazon.com/blogs/networking-and-content-delivery/introducing-flat-rate-pricing-plans-with-no-overages/, https://aws.amazon.com/cloudfront/pricing/, or https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/flat-rate-pricing-plan.html. To get started, visit the https://us-east-1.console.aws.amazon.com/cloudfront/v4/home?region=us-east-1#/distributions.

AWS announces flat-rate pricing plans for website delivery and security

Amazon Web Services (AWS) is launching flat-rate pricing plans with no overages for website delivery and security. The flat-rate plans, available with Amazon CloudFront, co...

#AWS #AwsWaf #AmazonCloudwatch #AmazonCloudfront

1 0 0 0
Preview
AWS announces flat-rate pricing plans for website delivery and security Amazon Web Services (AWS) is launching flat-rate pricing plans with no overages for website delivery and security. The flat-rate plans, available with Amazon CloudFront, combine global content delivery with AWS WAF, DDoS protection, Amazon Route 53 DNS, Amazon CloudWatch Logs ingestion, and serverless edge compute into a simple monthly price with no overage charges. Each plan also includes monthly Amazon S3 storage credits to help offset your storage costs. CloudFront flat-rate plans allow you to deliver your websites and applications without calculating costs across multiple AWS services. You won’t face the risk of overage charges, even if your website or application goes viral or faces a DDoS attack. Security features like WAF and DDoS protection are enabled by default, and additional configurations are simple to set up. When you serve your AWS applications through CloudFront instead of directly to the internet, your flat-rate plan covers the data transfer costs between your applications and your viewers for a simple monthly price without the worry of overages. This simplified pricing model is available alongside pay-as-you-go pricing for each CloudFront distribution, giving you the flexibility to choose the right pricing model and feature set for each application. Plans are available in Free ($0/month), Pro ($15/month), Business ($200/month), and Premium ($1,000/month) tiers for new and existing CloudFront distributions. Select the plan tier with the features and usage allowances matching your application’s needs. To learn more, refer to the Launch Blog, Plans and Pricing, or CloudFront Developer Guide. To get started, visit the CloudFront console.

🆕 AWS introduces flat-rate pricing for CloudFront, bundling global delivery, WAF, DDoS protection, etc., in four tiers: Free, Pro, Business, and Premium, with no overage charges.

#AWS #AwsWaf #AmazonCloudwatch #AmazonCloudfront

2 0 0 0
AWS WAF Targeted Bot Control, Fraud & DDoS Prevention Rule Group available in 3 more regions Starting today, AWS WAF’s Targeted Bot Control, Fraud, and DDoS Prevention Rule Group are available in the AWS Asia Pacific (Taipei), Asia Pacific (Bangkok), and Mexico (Central) regions. These features help customers to stay protected against sophisticated bots, application layer DDoS and account takeover attacks. AWS WAF is a web application firewall that helps you protect your web application resources against common web exploits and bots that can affect availability, compromise security, or consume excessive resources. To see the full list of regions where AWS WAF is currently available, visit the https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/. For more information about the service, visit the https://aws.amazon.com/waf/ page. For more information about pricing, visit the https://aws.amazon.com/waf/pricing/.

AWS WAF Targeted Bot Control, Fraud & DDoS Prevention Rule Group available in 3 more regions

Starting today, AWS WAF’s Targeted Bot Control, Fraud, and DDoS Prevention Rule Group are available in the AWS Asia Pacific (Taipei), Asia Pacific (Bangkok), and Mexico (Cent...

#AWS #AwsWaf #AwsShield

0 0 0 0
Preview
AWS WAF Targeted Bot Control, Fraud & DDoS Prevention Rule Group available in 3 more regions Starting today, AWS WAF’s Targeted Bot Control, Fraud, and DDoS Prevention Rule Group are available in the AWS Asia Pacific (Taipei), Asia Pacific (Bangkok), and Mexico (Central) regions. These features help customers to stay protected against sophisticated bots, application layer DDoS and account takeover attacks. AWS WAF is a web application firewall that helps you protect your web application resources against common web exploits and bots that can affect availability, compromise security, or consume excessive resources. To see the full list of regions where AWS WAF is currently available, visit the AWS Region Table. For more information about the service, visit the AWS WAF page. For more information about pricing, visit the AWS WAF Pricing page.

🆕 AWS WAF's Targeted Bot Control, Fraud, and DDoS Prevention Rule Group now available in Taipei, Bangkok, and Central Mexico regions to protect against sophisticated bots and attacks.

#AWS #AwsWaf #AwsShield

0 0 0 0

AWS WAF now available in AWS Asia Pacific (Taipei) Region! Protect web apps from exploits with this powerful firewall. 🏭🚀 #AWSWAF https://fefd.link/2zcJL

0 0 0 0
AWS WAF is now available in the AWS Asia Pacific (Taipei) Region Starting today, AWS WAF is available in the AWS Asia Pacific (Taipei) Region. AWS WAF is a web application firewall that helps you protect your web application resources against common web exploits and bots that can affect availability, compromise security, or consume excessive resources.  To see the full list of regions where AWS WAF is currently available, visit the https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/. Please note that AWS WAF Bot Control with targeted level of inspection and Anti-DDoS managed rule group are not currently available in this region. For more information about the service, visit the https://aws.amazon.com/waf/ page. For more information about pricing, visit the https://aws.amazon.com/waf/pricing/.

AWS WAF is now available in the AWS Asia Pacific (Taipei) Region

Starting today, AWS WAF is available in the AWS Asia Pacific (Taipei) Region.

AWS WAF is a web application firewall that helps you protect your web application resources against common web exploits an...

#AWS #AwsWaf #AwsShield

1 0 0 0
Preview
AWS WAF is now available in the AWS Asia Pacific (Taipei) Region Starting today, AWS WAF is available in the AWS Asia Pacific (Taipei) Region. AWS WAF is a web application firewall that helps you protect your web application resources against common web exploits and bots that can affect availability, compromise security, or consume excessive resources.  To see the full list of regions where AWS WAF is currently available, visit the AWS Region Table. Please note that AWS WAF Bot Control with targeted level of inspection and Anti-DDoS managed rule group are not currently available in this region. For more information about the service, visit the AWS WAF page. For more information about pricing, visit the AWS WAF Pricing page.

🆕 AWS WAF is now available in the Asia Pacific (Taipei) region to protect web apps from exploits and bots. Not all features are available yet. For full region list, visit AWS Region Table. For pricing, see AWS WAF Pricing page.

#AWS #AwsWaf #AwsShield

1 0 0 0
AWS WAF now includes free WAF Vended Logs based on request volume AWS WAF now includes 500 MB of CloudWatch Logs Vended Logs Ingestion for every 1 million WAF requests processed, at no additional cost. This helps customers better manage their WAF logging costs while maintaining comprehensive security visibility. WAF logs in CloudWatch provide valuable insights for security analysis, compliance, and troubleshooting. Customers can leverage CloudWatch's advanced analytics capabilities, including Log Insights queries, anomaly detection, and dashboards, to monitor and analyze their web application traffic patterns and security events. The included logs allocation is automatically applied based on WAF requests usage on your AWS bill at month end, making it easy to take advantage of the new pricing. The free WAF logs allocation is across WAF specific Vended Logs to CloudWatch, S3, and Firehose. Usage beyond the included 500 MB per 1 million WAF requests will be charged at AWS WAF specific Vended Logs pricing in CloudWatch. For pricing details, please visit the https://aws.amazon.com/waf/pricing/ To learn more about WAF logging capabilities and how to get started, visit the https://docs.aws.amazon.com/waf/latest/developerguide/logging-destinations.html

AWS WAF now includes free WAF Vended Logs based on request volume

AWS WAF now includes 500 MB of CloudWatch Logs Vended Logs Ingestion for every 1 million WAF requests processed, at no additional cost. This helps customers better manage their WAF logging costs whil...

#AWS #AwsWaf #AwsGovcloudUs

0 0 0 0
Preview
AWS WAF now includes free WAF Vended Logs based on request volume AWS WAF now includes 500 MB of CloudWatch Logs Vended Logs Ingestion for every 1 million WAF requests processed, at no additional cost. This helps customers better manage their WAF logging costs while maintaining comprehensive security visibility. WAF logs in CloudWatch provide valuable insights for security analysis, compliance, and troubleshooting. Customers can leverage CloudWatch's advanced analytics capabilities, including Log Insights queries, anomaly detection, and dashboards, to monitor and analyze their web application traffic patterns and security events. The included logs allocation is automatically applied based on WAF requests usage on your AWS bill at month end, making it easy to take advantage of the new pricing. The free WAF logs allocation is across WAF specific Vended Logs to CloudWatch, S3, and Firehose. Usage beyond the included 500 MB per 1 million WAF requests will be charged at AWS WAF specific Vended Logs pricing in CloudWatch. For pricing details, please visit the AWS WAF pricing page. To learn more about WAF logging capabilities and how to get started, visit the AWS WAF documentation.

🆕 AWS WAF now offers 500 MB free CloudWatch Logs per 1 million WAF requests, aiding cost management and security visibility. Usage beyond 500 MB incurs charges. For more, see AWS WAF documentation.

#AWS #AwsWaf #AwsGovcloudUs

1 0 0 0
AWS Firewall Manager provides support for AWS WAF L7 DDOS managed rules AWS Firewall Manager announces security policy support for enhanced application layer (L7) DDoS protection within AWS WAF. The application layer (L7) DDoS protection is an AWS Managed Rule group that automatically detects and mitigates DDoS events of any applications on Amazon CloudFront, Application Load Balancer (ALB) and other AWS services supported by WAF. AWS Firewall Manager helps cloud security administrators and site reliability engineers protect applications while reducing the operational overhead of manually configuring and managing rules. Working with AWS Firewall Manager, customers can provide defense in depth policies to address the full range of web site protections from the newly released AWS WAF (L7) DDoS protections to non-HTTP based threats to web site infrastructure. By looking at the totality of a web-sites’ technology stack, customers can define and deploy all the needed protections. AWS Firewall Manager support for application layer (L7) DDoS protection can be enabled for all AWS WAF and AWS Shield users. Customers can add this specialized Amazon Managed Rule set to a new or existing AWS Firewall Manager policy. AWS Firewall Manager supports this Amazon Managed Rule set in all regions where WAF offers the feature which means all Advanced subscribers in all supported AWS Regions, except Asia Pacific (Thailand), Mexico (Central), and China (Beijing and Ningxia). You can deploy this AWS Managed Rule group for your Amazon CloudFront, ALB, and other supported AWS resources. To learn more about how AWS Firewall Manager works with WAF’s new Managed Rules, see the AWS Firewall Manager https://docs.aws.amazon.com/waf/latest/developerguide/fms-chapter.htmlfor more details and the https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/ for the list of regions where AWS Firewall Manager is currently available. To learn more about AWS Firewall Manager, its features, and its pricing, visit the https://aws.amazon.com/firewall-manager/.  

AWS Firewall Manager provides support for AWS WAF L7 DDOS managed rules

AWS Firewall Manager announces security policy support for enhanced application layer (L7) DDoS protection within AWS WAF. The application layer (L7) DDoS protection is an A...

#AWS #AwsGovcloudUs #AwsFirewallManager #AwsWaf

1 0 0 0
Preview
AWS Firewall Manager provides support for AWS WAF L7 DDOS managed rules AWS Firewall Manager announces security policy support for enhanced application layer (L7) DDoS protection within AWS WAF. The application layer (L7) DDoS protection is an AWS Managed Rule group that automatically detects and mitigates DDoS events of any applications on Amazon CloudFront, Application Load Balancer (ALB) and other AWS services supported by WAF. AWS Firewall Manager helps cloud security administrators and site reliability engineers protect applications while reducing the operational overhead of manually configuring and managing rules. Working with AWS Firewall Manager, customers can provide defense in depth policies to address the full range of web site protections from the newly released AWS WAF (L7) DDoS protections to non-HTTP based threats to web site infrastructure. By looking at the totality of a web-sites’ technology stack, customers can define and deploy all the needed protections. AWS Firewall Manager support for application layer (L7) DDoS protection can be enabled for all AWS WAF and AWS Shield users. Customers can add this specialized Amazon Managed Rule set to a new or existing AWS Firewall Manager policy. AWS Firewall Manager supports this Amazon Managed Rule set in all regions where WAF offers the feature which means all Advanced subscribers in all supported AWS Regions, except Asia Pacific (Thailand), Mexico (Central), and China (Beijing and Ningxia). You can deploy this AWS Managed Rule group for your Amazon CloudFront, ALB, and other supported AWS resources. To learn more about how AWS Firewall Manager works with WAF’s new Managed Rules, see the AWS Firewall Manager documentation for more details and the AWS Region Table for the list of regions where AWS Firewall Manager is currently available. To learn more about AWS Firewall Manager, its features, and its pricing, visit the AWS Firewall Manager website.

🆕 AWS Firewall Manager adds AWS WAF L7 DDoS managed rules for better app layer DDoS protection across CloudFront, ALB, and more, cutting manual rule management and operational burden. Not available in Thailand, Central Mexico, Beijing, or Ningxia.

#AWS #AwsGovcloudUs #AwsFirewallManager #AwsWaf

0 0 0 0
AWS WAF announces general availability of Resource-level DDoS protection for Application Load Balancers (ALB) Today, Amazon Web Services (AWS) announced general availability of a new resource-level distributed denial of service (DDoS) mitigation capability for Application Load Balancers (ALB). This new WAF DDoS protection is directly integrated with ALB as an on-host agent to detect and mitigates DDoS attacks from known malicious sources within seconds while maintaining service quality for legitimate traffic. The WAF resource-level DDoS protection for ALBs is built on upon https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-ip-rep.html to provide rapid protection against known attack sources through static rules. This feature efficiently rate limits the traffic based on both direct client IP addresses and proxy networks by inspecting DDoS indicators in X-Forwarded-For (XFF) headers. Resource-level DDoS protection for ALBs can be configured to be active at all times or to be active only during high load conditions. You can enable this feature in AWS WAF for any Web ACL that is associated with ALB in all supported AWS Regions. See the https://aws.amazon.com/waf/pricing/ for more details on Web ACL pricing. To learn more about AWS WAF's resource level DDoS protection, visit the https://docs.aws.amazon.com/waf/latest/developerguide/waf-anti-ddos-alb.html or the https://console.aws.amazon.com/. To get started, refer to our https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-anti-ddos.html for detailed information about enabling this feature to protect your web applications.  

AWS WAF announces general availability of Resource-level DDoS protection for Application Load Balancers (ALB)

Today, Amazon Web Services (AWS) announced general availability of a new resource-level distributed denial of service (DDoS) mitigation capability for Application Load Ba...

#AWS #AwsWaf

1 0 0 0
Preview
AWS WAF announces general availability of Resource-level DDoS protection for Application Load Balancers (ALB) Today, Amazon Web Services (AWS) announced general availability of a new resource-level distributed denial of service (DDoS) mitigation capability for Application Load Balancers (ALB). This new WAF DDoS protection is directly integrated with ALB as an on-host agent to detect and mitigates DDoS attacks from known malicious sources within seconds while maintaining service quality for legitimate traffic. The WAF resource-level DDoS protection for ALBs is built on upon existing IP reputation rule group to provide rapid protection against known attack sources through static rules. This feature efficiently rate limits the traffic based on both direct client IP addresses and proxy networks by inspecting DDoS indicators in X-Forwarded-For (XFF) headers. Resource-level DDoS protection for ALBs can be configured to be active at all times or to be active only during high load conditions. You can enable this feature in AWS WAF for any Web ACL that is associated with ALB in all supported AWS Regions. See the AWS WAF pricing page for more details on Web ACL pricing. To learn more about AWS WAF's resource level DDoS protection, visit the AWS WAF documentation or the AWS WAF console. To get started, refer to our technical documentation for detailed information about enabling this feature to protect your web applications.

🆕 AWS WAF now offers general availability of resource-level DDoS protection for ALBs, integrating directly with ALB to detect and mitigate attacks from known sources, maintaining service quality for legitimate traffic, and can be configured for constant or high-load conditions.

#AWS #AwsWaf

1 0 0 0
AWS WAF reduces web application security configuration steps and provides expert-level protection Today, AWS announces general availability of the AWS WAF simplified console experience that reduces web application security configuration steps by up to 80% and provides expert-level protection to help you optimize application security. AWS WAF helps protect web applications and APIs against common web exploits and bots that could affect availability, compromise security, or consume excessive resources. Security teams can now implement comprehensive protection for applications within minutes through pre-configured protection packs that incorporate AWS security expertise and are continuously updated to address emerging threats. These templates provide extensive security coverage including protection against common web vulnerabilities, malicious bot traffic, application layer DDoS events, and API-specific threats, all customized to your application type. With the new console experience, select the application type, such as E-commerce platforms or transaction processing applications, to automatically apply expert-curated protection rules optimized for the specific use case. The unified dashboard provides consolidated security metrics, threat detection, and rule performance data, enabling security teams to quickly identify and respond to potential threats while maintaining full security control. Key security controls, including rate limiting, geographic restrictions, and IP reputation filtering, can be customized through an intuitive single-page interface that reduces configuration time. The new AWS WAF console experience is available in all AWS Regions, including the AWS GovCloud (US) Regions and the China Regions. To learn more about the new AWS WAF console experience, see the following resources: https://aws.amazon.com/waf/features/ https://docs.aws.amazon.com/waf/latest/developerguide/getting-started.html Launch Blog

AWS WAF reduces web application security configuration steps and provides expert-level protection

Today, AWS announces general availability of the AWS WAF simplified console experience that reduces web application security configuration steps by up to 80% and provi...

#AWS #AwsGovcloudUs #AwsWaf

0 0 0 0
Preview
AWS WAF reduces web application security configuration steps and provides expert-level protection Today, AWS announces general availability of the AWS WAF simplified console experience that reduces web application security configuration steps by up to 80% and provides expert-level protection to help you optimize application security. AWS WAF helps protect web applications and APIs against common web exploits and bots that could affect availability, compromise security, or consume excessive resources. Security teams can now implement comprehensive protection for applications within minutes through pre-configured protection packs that incorporate AWS security expertise and are continuously updated to address emerging threats. These templates provide extensive security coverage including protection against common web vulnerabilities, malicious bot traffic, application layer DDoS events, and API-specific threats, all customized to your application type. With the new console experience, select the application type, such as E-commerce platforms or transaction processing applications, to automatically apply expert-curated protection rules optimized for the specific use case. The unified dashboard provides consolidated security metrics, threat detection, and rule performance data, enabling security teams to quickly identify and respond to potential threats while maintaining full security control. Key security controls, including rate limiting, geographic restrictions, and IP reputation filtering, can be customized through an intuitive single-page interface that reduces configuration time. The new AWS WAF console experience is available in all AWS Regions, including the AWS GovCloud (US) Regions and the China Regions. To learn more about the new AWS WAF console experience, see the following resources: Features page Getting Started with AWS WAF Launch Blog

🆕 AWS WAF now offers a simplified console for up to 80% fewer security config steps, providing expert-level protection and pre-configured protection packs for web apps and APIs, available in all AWS Regions.

#AWS #AwsGovcloudUs #AwsWaf

0 0 0 0
Amazon CloudFront simplifies web application delivery and security with new user-friendly interface Try the simplified console experience with Amazon CloudFront to accelerate and secure web applications within a few clicks by automating TLS certificate provisioning, DNS configuration, and security settings through an integrated interface with AWS WAF's enhanced Rule Packs.

Amazon CloudFront simplifies web application delivery and security with new user-friendly interface

Try the simplified console experience with Amazon CloudFront to accelerate and secure web applications within a few clicks ...

#AWS #AmazonCloudfront #Announcements #AwsWaf #Featured #Launch #News

0 0 0 0
AWS Weekly Roundup: AWS re:Inforce 2025, AWS WAF, AWS Control Tower, and more (June 16, 2025) Today marks the start of AWS re:Inforce 2025, where security professionals are gathering for three days of technical learning sessions, workshops, and demonstrations. This security-focused conference brings together AWS security specialists who build and maintain the services that organizations rely on for their cloud security needs. AWS Chief Information Security Officer (CISO) Amy Herzog will […]

AWS Weekly Roundup: AWS re:Inforce 2025, AWS WAF, AWS Control Tower, and more (June 16, 2025)

Today marks the start of AWS re:Inforce 2025, where security professionals are gathering for three days of technica...

#AWS #Announcements #AwsControlTower #AwsLambda #AwsWaf #Launch #News #WeekInReview

1 0 0 0
AWS WAF now supports automatic application layer distributed denial of service (DDoS) protection Today, AWS announces enhanced application layer (L7) DDoS protection capabilities with faster automatic detection and mitigation, designed to respond to events within seconds. AWS WAF application layer (L7) DDoS protection is an AWS Managed Rule group that automatically detects and mitigates DDoS events of any duration to ensure your applications on Amazon CloudFront, Application Load Balancer (ALB) and other AWS services supported by WAF stay available and responsive to your users. This enhancement helps cloud security administrators and site reliability engineers protect applications while reducing the operational overhead of manually configuring and managing rules. This AWS Managed Rule group monitors traffic data to establish a baseline within minutes of activation, then leverages machine learning models to detect anomalies from normal traffic patterns. When traffic deviates from the established baseline, the system automatically applies rules designed to address suspicious requests. You can configure rules to suit the needs of your applications, such as presenting a challenge or blocking a request. AWS WAF application layer (L7) DDoS protection can be enabled by all AWS WAF and AWS Shield Advanced subscribers in all supported AWS Regions, except Asia Pacific (Thailand), Mexico (Central), and China (Beijing and Ningxia). You can deploy this AWS Managed Rule group for your Amazon CloudFront, ALB, and other supported AWS resources. See the Pricing page for more details. To learn more about AWS WAF application layer (L7) DDoS protection, visit the https://docs.aws.amazon.com/waf/latest/developerguide/waf-anti-ddos.html or the https://console.aws.amazon.com/. To get started, refer to our https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-anti-ddos.html for detailed information about enabling this feature to protect your web applications.  

AWS WAF now supports automatic application layer distributed denial of service (DDoS) protection

Today, AWS announces enhanced application layer (L7) DDoS protection capabilities with faster automatic detection and mitigation, designed to respond to events within secon...

#AWS #AwsWaf #AwsShield

1 0 0 0
Preview
AWS WAF now supports automatic application layer distributed denial of service (DDoS) protection Today, AWS announces enhanced application layer (L7) DDoS protection capabilities with faster automatic detection and mitigation, designed to respond to events within seconds. AWS WAF application layer (L7) DDoS protection is an AWS Managed Rule group that automatically detects and mitigates DDoS events of any duration to ensure your applications on Amazon CloudFront, Application Load Balancer (ALB) and other AWS services supported by WAF stay available and responsive to your users. This enhancement helps cloud security administrators and site reliability engineers protect applications while reducing the operational overhead of manually configuring and managing rules. This AWS Managed Rule group monitors traffic data to establish a baseline within minutes of activation, then leverages machine learning models to detect anomalies from normal traffic patterns. When traffic deviates from the established baseline, the system automatically applies rules designed to address suspicious requests. You can configure rules to suit the needs of your applications, such as presenting a challenge or blocking a request. AWS WAF application layer (L7) DDoS protection can be enabled by all AWS WAF and AWS Shield Advanced subscribers in all supported AWS Regions, except Asia Pacific (Thailand), Mexico (Central), and China (Beijing and Ningxia). You can deploy this AWS Managed Rule group for your Amazon CloudFront, ALB, and other supported AWS resources. See the Pricing page for more details. To learn more about AWS WAF application layer (L7) DDoS protection, visit the AWS WAF documentation or the AWS WAF console. To get started, refer to our technical documentation for detailed information about enabling this feature to protect your web applications.

🆕 AWS WAF provides automatic L7 DDoS protection for quicker detection and mitigation, keeping CloudFront and ALB applications available. Its managed rule group uses machine learning to detect anomalies and apply rules. Available for all WAF and Shield Advanced subscribers …

#AWS #AwsWaf #AwsShield

2 0 0 0
Announcing ASN match support for AWS WAF AWS WAF now supports matching incoming request against Autonomous System Numbers (ASNs). By monitoring and restricting traffic from specific ASNs, you can mitigate risks associated with malicious actors, comply with regulatory requirements, and optimize the performance and availability of your web applications. This new ASN Match Statement integrates seamlessly with existing WAF rules, making it easy for you to incorporate ASN based security controls into your overall web application defense strategy. You can specify a list of ASNs to match against incoming request and take appropriate action such as block or allow the request. You can also use ASN in your rate-based rule statements. These rules aggregate requests according to your criteria, counts and rate limits the requests based on the rule's evaluation window, request limit, and action settings. ASN Match statement is available in all regions where AWS WAF is available. The rate-based rule support with ASN is available in regions where the enhanced rate-based rules are currently supported. There is no additional cost for using ASN in Match statement and rate-based rules, however standard AWS WAF charges still apply. For more information about the service, visit the https://aws.amazon.com/waf/ page. For more information about pricing, visit the https://aws.amazon.com/waf/pricing/

Announcing ASN match support for AWS WAF

AWS WAF now supports matching incoming request against Autonomous System Numbers (ASNs). By monitoring and restricting traffic from specific ASNs, you can mitigate risks associated with malicious actors, comply with regulato...

#AWS #AwsGovcloudUs #AwsWaf

1 0 0 0
Preview
Announcing ASN match support for AWS WAF AWS WAF now supports matching incoming request against Autonomous System Numbers (ASNs). By monitoring and restricting traffic from specific ASNs, you can mitigate risks associated with malicious actors, comply with regulatory requirements, and optimize the performance and availability of your web applications. This new ASN Match Statement integrates seamlessly with existing WAF rules, making it easy for you to incorporate ASN based security controls into your overall web application defense strategy. You can specify a list of ASNs to match against incoming request and take appropriate action such as block or allow the request. You can also use ASN in your rate-based rule statements. These rules aggregate requests according to your criteria, counts and rate limits the requests based on the rule's evaluation window, request limit, and action settings. ASN Match statement is available in all regions where AWS WAF is available. The rate-based rule support with ASN is available in regions where the enhanced rate-based rules are currently supported. There is no additional cost for using ASN in Match statement and rate-based rules, however standard AWS WAF charges still apply. For more information about the service, visit the AWS WAF page. For more information about pricing, visit the AWS WAF Pricing page

🆕 AWS WAF now supports ASN match to block/allow traffic from specific Autonomous System Numbers, enhancing security. No extra cost; standard WAF charges apply. Available in all regions; rate-based rules in select regions.

#AWS #AwsGovcloudUs #AwsWaf

1 0 0 0
Preview
A Beginner’s Guide to AWS WAF: Sample Project Quick Guide: Configuring AWS WAF and ELB with a Practical Example In this blog, we will walk through the process of configuring **AWS Web Application Firewall (WAF)** to protect applications hosted on AWS. As per AWS documentation, AWS WAF is a web application firewall service that lets you monitor web requests that are forwarded to an Amazon API Gateway API, an Amazon CloudFront distribution, or an Application Load Balancer. You can protect those resources based on conditions that you specify, such as the IP addresses that the requests originate from. ### Benefits and features (AWS Documentation) #### Agile protection against web attacks AWS WAF rule propagation and updates take just under a minute, enabling you to react faster when you are under an attack or when security issues arise. WAF supports hundreds of rules that can inspect any part of the web request with minimal latency impact to incoming traffic. #### Save time with managed rules With managed Rules for AWS WAF, you can quickly get started and protect your web application or APIs against common threats. managed Rules are updated automatically and are available from AWS or AWS Marketplace sellers. #### Improved web traffic visibility AWS WAF gives near real-time visibility into your web traffic, which you can use to create new rules or alerts in Amazon CloudWatch. In addition, AWS WAF offers comprehensive logging, allowing you to capture each inspected web request’s full header data for use in security automation, analytics, or auditing. #### Ease of deployment and maintenance AWS WAF is easy to deploy and protects application(s) deployed on either Amazon CloudFront, the Application Load Balancer, or Amazon API Gateway. There is no additional software to deploy, DNS configuration, or SSL/TLS certificate to manage. For demonstration purposes, we’ll be using the **Example Voting App** from Docker’s official GitHub repository: 👉 https://github.com/dockersamples/example-voting-app We’ll explore how to secure this sample application using AWS WAF, and also review some of the advanced security modules available in the **AWS Marketplace** to enhance your application’s protection further. To get started, we have launched an **EC2 instance running Ubuntu** as the host environment for our demo application: _EC2 instance information_ Once the server is ready, connect to it via **SSH** and install **Docker**. We will run the application using **Docker Compose** , which allows us to manage the application’s components as containers efficiently. You can follow the official Docker documentation to install Docker on your machine: 👉 https://docs.docker.com/engine/install/ _ssh terminal_ Now create a new folder “voting_app” and clone the **Example Voting App** repository from Docker’s official GitHub to your EC2 instance: GitHub - dockersamples/example-voting-app: Example distributed app composed of multiple containers for Docker, Compose, Swarm, and Kubernetes Once the repository is cloned, navigate to the application directory and start the containers using Docker Compose (make sure you can see docker-compose.yml file in the path before applying the docker compose command) : cd example-voting-app docker compose up -d This command will launch all the required services in detached mode: _File structure_ _Building docker containers_ To verify that all containers are up and running, execute the following command: docker ps -a Once the containers are running, open your browser and navigate to your EC2 instance’s public IP address with port **8080** to verify the application is accessible: https://13.201.54.199:8080/ Before accessing the application, ensure that **port 8080** is allowed in the **EC2 security group rules** to permit inbound traffic. This step is crucial to confirm that the application is reachable from your browser. _Voting App Website_ Now that the application is up and running, let’s proceed to create an **AWS Web Application Firewall (WAF)** to secure it. AWS WAF will help protect your application from common web exploits and malicious traffic. AWS WAF **cannot** be directly attached to an EC2 instance. It requires integration with one of the following: * **Application Load Balancer (ALB)** * **Amazon CloudFront** * **Amazon API Gateway** * **AWS App Runner** For your EC2-hosted application, you will need to place it **behind an ALB or use CloudFront** as a distribution layer. This allows AWS WAF to inspect and filter traffic **before** it reaches your EC2 instance. Now, we’ll take an **AMI (Amazon Machine Image)** of the existing EC2 instance. This will allow us to launch a **second identical EC2 instance** , enabling us to simulate a load-balanced environment. Once the new instance is created: 1. We will add **both EC2 instances** to a **Target Group**. 2. Then, we’ll create an **Application Load Balancer (ALB)** and attach the Target Group to it. This setup will allow us to: * Distribute traffic across multiple instances. * Attach **AWS WAF** directly to the ALB. * Ensure higher availability and scalability. Navigate to the **EC2 Dashboard** in the AWS Console and follow these steps: _Step 1_ While creating the image: * **Enter a name and description** to easily identify the AMI later. * **Uncheck the “Reboot instance” option** to prevent downtime during image creation. * Optionally, **add a key tag** (e.g., Name: voting-app-ami) to help filter and locate the image quickly, especially in environments with multiple AMIs. _step 2_ After the AMI is ready, navigate to the **AMIs** section in the EC2 console. Select your newly created image and click **“Launch instance from image”** as shown below: Proceed with the instance launch wizard by selecting the appropriate instance type, security groups, and key pair, then complete the launch. instance. Otherwise, it cannot be added to the same **Elastic Load Balancer (ELB) target group**. You can launch the instance in any **Availability Zone (AZ)** within the same VPC to enhance **fault tolerance**. _New EC2 created successfully_ Once the second EC2 instance is launched: 1. **SSH into the instance**. 2. Navigate to the application directory as done on the first EC2 machine * cd example-voting-app 1. Run the application using Docker Compose: * docker compose up -d > Creating Target group for ALB With both EC2 instances ready, the next step is to create a **Target Group**. This group will manage the instances that receive traffic from the Application Load Balancer (ALB). _Creating target group for ALB_ _Target group configuration_ Once you update the configuration and click next, you will be directed to another page asking for the resources: _Choose the corresponding EC2 machiines and create the target group_ Once the Target Group is ready, create the **Application Load Balancer**. Follow the steps shown in the screenshot below: _Creating a loadbalancer for the Application_ > Creating ALB (Application Load Balancer) AWS offers **three types of Elastic Load Balancers (ELBs)** : **Application Load Balancer (ALB)** * Operates at **Layer 7 (HTTP/HTTPS)**. * Ideal for web applications and supports features like **host-based** and **path-based routing**. **Network Load Balancer (NLB)** * Works at **Layer 4 (TCP/UDP)**. * Designed for **high performance** and **low latency** , suitable for real-time applications or large-scale traffic. **Gateway Load Balancer (GWLB)** * Used for deploying, scaling, and managing **third-party virtual appliances** (e.g., firewalls, intrusion detection systems). * Operates at **Layer 3** and **Layer 4**. For this setup, we are using an **Application Load Balancer (ALB)** , as it is best suited for HTTP-based applications. _Application Load balancer_ Now follow the below configuration _Basic configuration_ In the network mapping, choose the right VPC and select the Availability zone and subnets which the EC2 machines are created, here I am selecting all subnets hence I want to scale the EC2 machine in future projects. _Networking_ Now select the security group and listener configuration for the load balancer. Choose the target to in the routing option (tag 3) as in the following screenshot: _Securtiy group, listener and routing_ For the remaining configuration options, you can **leave them as default (unchecked)** , as shown in the screenshot below: _Other configuration_ These default settings are sufficient for our current use case. We will configure the **WAF** later. Once reviewed, proceed to **create the load balancer**. After completing the load balancer configuration, verify that the load balancer’s DNS name correctly loads your application in a web browser. If you encounter issues accessing the application via the load balancer DNS, ensure that the necessary ports are open and properly configured in the associated security groups. Refer to the following guidelines to confirm your security group settings are allowing the required traffic. _EC2 instances security group rules_ _Load balancer security group rules_ **Note: In real-world deployments, EC2 instances are typically placed in private subnets with no direct internet access. For testing purposes only, we are exposing them to the public network in this setup.** > Configuring WAF for the project Navigate to the AWS Management Console, search for **“WAF”** in the search bar, and select **“WAF & Shield”** from the results. Then Click on ‘Create web ACL’ _AWS WAF_ Next, specify the resource type, select the correct AWS region, and provide a clear description. Once done, click on “Add AWS Resources” to proceed. _Creating web ACL_ Now, select the appropriate resource type and choose the Application Load Balancer (ALB) you created earlier. Then, click “Add” to continue. _Configuring WAF_ On the next page, you can add managed rule groups to your WAF. AWS offers a variety of built-in rule groups, and you can also choose from third-party providers such as Cloudbric, Fortinet, GeoGuard, and more. _Managed rule groups in AWS WAF_ Click on “AWS Managed Rule Groups” to view a list of free, pre-configured rule groups provided by AWS. These offer baseline protection against common threats such as SQL injection, cross-site scripting, and other OWASP Top 10 vulnerabilities. In this case, I enabled following rule groups. If you click ‘edit’ you can edit certain parameters and customize the rule groups as per your needs. _Managed rule group_ In the upcoming window, you can keep the default one. On the next page, you can retain the default settings. This is where you define the default action for requests that do not match any rules in the Web ACL. If you’re applying IP filtering or similar rules, you can use this setting to block all other requests that do not originate from the expected IP addresses. _Configure metrics_ On the next page, you can set the priority for each rule group within the Web ACL. This determines the evaluation order — similar to an if condition chain. The rules are processed in sequence: if the first rule allows the request, the next rule is evaluated, and so on. If any rule blocks the request, evaluation stops immediately and the request is denied. After clicking “Next,” you’ll be taken to the review page. Verify all the configurations, and once everything looks correct, click “Create Web ACL” to finalize the setup. _Create Web ACL_ Now, let’s look at how to add custom rules and rule groups to the Web ACL. While managed rule groups provide convenience, they offer limited customization. Custom rules give you full control, allowing you to define specific conditions and actions based on your application’s unique requirements. Lets go to the WAF configuration and create rules as in the following screenshot: _Web ACL Configuration_ As shown in the following screenshot, you’ll see various rule types — such as IP set, rule builder, and rule group. In this example, we’re going to implement a CAPTCHA challenge specifically for users accessing the application from India. If needed, you can also create IP sets to allow or block specific addresses or apply rules based on IP ranges. _WAF Custom rules_ Now, reload the Load Balancer DNS name in your browser and verify that the changes have taken effect as expected. You should see the configured CAPTCHA challenge applied to users from India (You can choose your country so that you can verify the changes) In this guide, we successfully secured an application using AWS WAF integrated with an Application Load Balancer (ALB). We configured managed and custom WAF rules, implemented a CAPTCHA challenge specifically for users from India, and applied appropriate security group settings. This setup demonstrates a practical approach to enhancing application security on AWS. For production environments, always consider refining your rules, monitoring traffic patterns, and following best practices for access control. For deep understanding about WAF and shielf, https://docs.aws.amazon.com/waf/
0 0 0 0
AWS WAF is expanding the availability of its enhanced rate-based rules feature across multiple regions AWS WAF is expanding the availability of its https://aws.amazon.com/blogs/security/discover-the-benefits-of-aws-waf-advanced-rate-based-rules/ to customers in the following AWS Regions: Asia Pacific (Hyderabad), Australia (Melbourne), Israel (Tel Aviv), and Asia Pacific (Malaysia). This feature supports additional request parameters for rate-based rules, including cookies and other HTTP headers. Additionally, customers can now create composite keys based on up to 5 request parameters, providing more granular options for managing and securing web application traffic. Customers could already use WAF rate-based rules to automatically block requests from IP addresses that make large numbers of requests within a short period of time until the rate of requests falls below a customer-defined threshold. Now, WAF customers can aggregate requests by combining IP addresses with other request parameters (“keys”). Supported keys include cookies and other request headers, query strings or query arguments, cookies, label namespaces, and HTTP methods. By combining multiple request parameters into a single composite key, customers can detect and mitigate potential threats with higher accuracy. There is no additional cost for using this feature, however standard AWS WAF charges still apply. For more information about pricing, visit the https://aws.amazon.com/waf/pricing/. This feature is now available in all AWS regions where WAF is supported, except the China (Beijing) and China (Ningxia) Regions. To learn more, see the AWS WAF https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-type-rate-based.html. For more information about the service, visit the https://aws.amazon.com/waf/ page.

AWS WAF is expanding the availability of its enhanced rate-based rules feature across multiple regions

AWS WAF is expanding the availability of its aws.amazon.com/blogs/security/discover-... to custo...

#AWS #AwsWaf #AwsShield #AwsGovcloudUs

0 0 0 0
Preview
AWS WAF is expanding the availability of its enhanced rate-based rules feature across multiple regions AWS WAF is expanding the availability of its enhanced rate-based rules feature to customers in the following AWS Regions: Asia Pacific (Hyderabad), Australia (Melbourne), Israel (Tel Aviv), and Asia Pacific (Malaysia). This feature supports additional request parameters for rate-based rules, including cookies and other HTTP headers. Additionally, customers can now create composite keys based on up to 5 request parameters, providing more granular options for managing and securing web application traffic. Customers could already use WAF rate-based rules to automatically block requests from IP addresses that make large numbers of requests within a short period of time until the rate of requests falls below a customer-defined threshold. Now, WAF customers can aggregate requests by combining IP addresses with other request parameters (“keys”). Supported keys include cookies and other request headers, query strings or query arguments, cookies, label namespaces, and HTTP methods. By combining multiple request parameters into a single composite key, customers can detect and mitigate potential threats with higher accuracy. There is no additional cost for using this feature, however standard AWS WAF charges still apply. For more information about pricing, visit the AWS WAF Pricing page. This feature is now available in all AWS regions where WAF is supported, except the China (Beijing) and China (Ningxia) Regions. To learn more, see the AWS WAF developer guide. For more information about the service, visit the AWS WAF page.

🆕 AWS WAF expands enhanced rate-based rules to more regions, adding support for cookies, headers, and composite keys for better traffic management. No extra cost; standard WAF charges apply. Available in all regions except China (Beijing) and China (Ningxia).

#AWS #AwsWaf #AwsShield #AwsGovcloudUs

0 0 0 0
AWS WAF Targeted Bot Control and Fraud Control is now available in two additional regions Starting today, you can use AWS WAF Bot and Fraud Control RuleGroup in 2 additional AWS regions: AWS Canada West (Calgary) and AWS Asia Pacific (Malaysia) region. AWS WAF Bot Control and Fraud Control deliver comprehensive security for web applications, APIs, and mobile apps. Bot Control protects against automated bot traffic with easy deployment and configurable actions, ensuring scalable management. Fraud Control focuses on preventing account takeovers and fraudulent account creation, leveraging machine learning to reduce financial losses and enhance user trust. Both solutions integrate seamlessly with AWS WAF, providing real-time visibility and detailed metrics for effective protection and operational efficiency. For more information, visit the https://aws.amazon.com/waf/ page. For more information about pricing, visit the https://aws.amazon.com/waf/pricing/.  

AWS WAF Targeted Bot Control and Fraud Control is now available in two additional regions

Starting today, you can use AWS WAF Bot and Fraud Control RuleGroup in 2 additional AWS regions: AWS Canada West (Calgary) and AWS Asia Pacific (Malaysia) region.

AWS WAF Bot Control an...

#AWS #AwsWaf

0 0 0 0
Preview
AWS WAF Targeted Bot Control and Fraud Control is now available in two additional regions Starting today, you can use AWS WAF Bot and Fraud Control RuleGroup in 2 additional AWS regions: AWS Canada West (Calgary) and AWS Asia Pacific (Malaysia) region. AWS WAF Bot Control and Fraud Control deliver comprehensive security for web applications, APIs, and mobile apps. Bot Control protects against automated bot traffic with easy deployment and configurable actions, ensuring scalable management. Fraud Control focuses on preventing account takeovers and fraudulent account creation, leveraging machine learning to reduce financial losses and enhance user trust. Both solutions integrate seamlessly with AWS WAF, providing real-time visibility and detailed metrics for effective protection and operational efficiency. For more information, visit the AWS WAF page. For more information about pricing, visit the AWS WAF Pricing page.

🆕 AWS WAF Bot Control and Fraud Control now available in AWS Canada West (Calgary) and Asia Pacific (Malaysia) for enhanced web application security, bot traffic protection, and fraud prevention with machine learning.

#AWS #AwsWaf

0 0 0 0
AWS Weekly Roundup: Amazon Bedrock, Amazon QuickSight, AWS Amplify, and more (March 31, 2025) It’s AWS Summit season! Free events are now rolling out worldwide, bringing our cloud computing community together to connect, collaborate, and learn. Whether you prefer joining us online or in-person, these gatherings offer valuable opportunities to expand your AWS knowledge. I’ll be attending the AWS Amsterdam Summit and would love to meet you—if you’re planning […]

AWS Weekly Roundup: Amazon Bedrock, Amazon QuickSight, AWS Amplify, and more (March 31, 2025)

It’s AWS Summit season! Free events are now rolling out worldwide, bringing our cloud computing community together to connect, coll...

#AWS #AmazonBedrock #AmazonQ #Announcements #AwsWaf #Launch #News

0 0 0 0
Reduce your operational overhead today with Amazon CloudFront SaaS Manager Amazon CloudFront SaaS Manager helps software-as-a-service (SaaS) providers and web hosting platforms efficiently manage delivery across multiple domains. CloudFront SaaS Manager can dramatically reduce operational complexity while providing high-performance content delivery and enterprise-grade security for every customer domain.

Reduce your operational overhead today with Amazon CloudFront SaaS Manager

Amazon CloudFront SaaS Manager helps software-as-a-service...

#AWS #AmazonCloudfront #Announcements #AwsCertificateManager #AwsWaf #Featured #Launch #Networking&ContentDelivery #News #Saas #Security #Identity #&Compliance

0 0 0 0
Firewall support for AWS Amplify hosted sites AWS Amplify Hosting now offers direct integration with AWS WAF, allowing users to apply web application firewall protection to their hosted apps through the console or infrastructure as code, eliminating the need for complex Amazon CloudFront configurations.

Firewall support for AWS Amplify hosted sites

AWS Amplify Hosting now offers direct integration with AWS WAF, allowing users to apply web application firewall protection to the...

#AWS #Announcements #AwsAmplify #AwsWaf #Featured #FrontEndWeb&Mobile #Launch #News #Security #Identity #&Compliance

0 0 0 0