🔐
AWS SCS-C01
  • Practice Test Scores
  • Domain 1 - Incident Response
    • Incident Response
    • Exposed AWS Access Keys
    • Compromised EC2 Instance
    • How do you report abuse of AWS resources?
    • GuardDuty
    • Penetration Testing
  • Domain 2 - Logging & Monitoring
    • Some Basics
    • Inspector
    • Security Hub
    • AWS WAF
    • Systems Manager
    • Systems Manager Features
    • CloudWatch Logs
    • Athena
    • CloudTrail
    • Config
    • Trusted Advisor
    • CloudTrail Log File Integrity
    • Macie
    • S3 Event Notifications
    • VPC Flow Logs
    • Centralized Logging Architecture
  • Domain 3 - Infrastructure Security
    • Bastion Hosts
    • Site-to-Site VPN
    • VPC Peering
    • VPC Endpoints
    • Network ACL
    • Firewall vs IPS vs IDS
    • EBS
    • CloudFront
    • Shield
    • Mitigating DDoS Attacks
    • EC2 Key Pair Troubleshooting
    • EC2 Tenancy
    • Artifact
    • Lambda@Edge
    • Simple Email Service (SES)
    • DNS Support in VPC
  • Domain 4 - Identity & Access Management
    • Organizations
    • IAM Policy Evaluation Logic
    • Understanding IAM Policies
    • IAM Tutorial: Delegate access across AWS accounts using IAM roles
    • External ID
    • iptables
    • IAM policy elements: Version
    • IAM policy elements: Variables and tags
    • Policy elements: Principal and NotPrincipal
    • IAM policy elements: Condition
    • Security Token Service (STS)
    • Identity federation in AWS
    • Enabling SAML for your AWS resources
    • Single Sign-On
    • Cognito
    • Directory Service
    • Trusts in Active Directory
    • Example S3 Bucket Policies
    • Cross-account access to S3 buckets using Resource-based policies and IAM policies
    • S3 Access Control Lists (ACLs)
    • Presigned URLs
    • S3 Versioning
    • S3 Cross-Region Replication (CRR)
    • S3 Object Lock
    • Configuring MFA-protected API access
    • IAM Permission Boundaries
  • Domain 5 - Data Protection
  • CloudHSM
  • Key Management Service (KMS)
  • Symmetric CMKs vs Asymmetric CMKs
  • Data Key Caching
  • Deleting KMS CMKs
  • Default KMS Key Policy
  • Managing access to KMS CMKs
  • KMS CMK Key Types
  • Rotating KMS CMKs
  • Example Key Policies for KMS Questions
  • KMS Grants
  • KMS CLI Commands
  • Importing key material in KMS
  • KMS Condition Keys
  • Migrating Encrypted KMS Data Across Regions
  • KMS Encryption Context
  • CloudHSM vs KMS
  • S3 Data Encryption
  • Application Load Balancer (ALB)
  • ELB Listeners Part 1
  • ELB Listeners Part 2
  • AWS Certificate Manager (ACM)
  • Glacier
  • DynamoDB Encryption
  • AWS Secrets Manager
  • Summaries
    • Domain 1
    • Domain 2
    • Domain 3
    • Domain 4
    • Domain 5
Powered by GitBook
On this page
  • Rule statements
  • Web ACLs
  • Rules
  • Rules groups

Was this helpful?

  1. Domain 2 - Logging & Monitoring

AWS WAF

  • WAF is a web application firewall that lets you monitor the HTTP(S) requests that are forwarded to a CloudFront distribution, an API Gateway REST API, an Application Load Balancer, or an AppSync GraphQL API and it also lets you control access to your content.

  • Based on conditions that you specify, such as the IP addresses that requests originate from or the values of query strings, the service associated with your protected resource responds to requests either with the requested content or with an HTTP 403 status code (Forbidden).

    • You can also configure CloudFront to return a custom error page when a request is blocked.

Rule statements

  • Rule statements are the part of a rule that tells WAF how to inspect a web request, e.g. you could have a statement that provides a set of originating countries to check your web requests for.

  • Rule statements can also be very complex, e.g. you could have a statement that combines many other statements with logical AND, OR, and NOT statements.

Web ACLs

  • This is the centralized place that contains the rules, rule statements and associated configuration for the Web ACL associated to it.

Rules

  • Each rule contains:

    • A statement that defines the inspection criteria.

    • An action to take if a web request meets the criteria.

  • Three types of rules:

    • Match statements compare the web request or its origin against conditions that you provide.

    • Logical rules statements allow you to combine other statements or negate their results.

    • Complex statements.

  • An example of a match statement is a XSS scripting attack rule (inspects for cross-site scripting attacks in a specified request component).

  • An example of a complex statement is a rate-based rule (tracks the rate of requests from individual IP addresses).

  • When a web request meets the criteria, that's a match.

  • If you define more than one Rule in a Web ACL, WAF evaluates each request against the Rules in order based on the value of Priority.

    • WAF processes rules with lower priority first.

Rules groups

  • You can use rules individually or in reusable rule groups.

  • Rule groups can't contain the following rule statement types:

    • Rule group reference statements.

    • Rate-based rule statements.

  • You can reuse a single rule group in multiple web ACLs by adding a rule group reference statement to each web ACL.

    • You can't reuse a web ACL.

PreviousSecurity HubNextSystems Manager

Last updated 4 years ago

Was this helpful?