Book Image

AWS Certified Solutions Architect ??? Associate Guide

By : Gabriel Ramirez, Stuart Scott
Book Image

AWS Certified Solutions Architect ??? Associate Guide

By: Gabriel Ramirez, Stuart Scott

Overview of this book

Amazon Web Services (AWS) is currently the leader in the public cloud market. With an increasing global interest in leveraging cloud infrastructure, the AWS Cloud from Amazon offers a cutting-edge platform for architecting, building, and deploying web-scale cloud applications. As more the rate of cloud platform adoption increases, so does the need for cloud certification. The AWS Certified Solution Architect – Associate Guide is your one-stop solution to gaining certification. Once you have grasped what AWS and its prerequisites are, you will get insights into different types of AWS services such as Amazon S3, EC2, VPC, SNS, and more to get you prepared with core Amazon services. You will then move on to understanding how to design and deploy highly scalable applications. Finally, you will study security concepts along with the AWS best practices and mock papers to test your knowledge. By the end of this book, you will not only be fully prepared to pass the AWS Certified Solutions Architect – Associate exam but also capable of building secure and reliable applications.
Table of Contents (26 chapters)
22
Mock Test 1
23
Mock Test 2

AWS web application firewall

AWS WAF works closely with Amazon CloudFront and Application Load Balancers (ALBs) and its primary function is to prevent your web applications from being subjected to intrusion by common attack patterns. By working in conjunction with CloudFront distributions and ALBs, AWS WAF can dictate how these services respond to web requests based on preconfigured conditions. This allows all HTTP and HTTPS requests to be filtered and identified as genuine or damaging inbound requests which are then either allowed or blocked as required.

There are three main component of the AWS WAF service in how it configured to help protect your web applications, these components are comprised of the following:

  • Conditions
  • Rules
  • Web access control lists (ACLs)

Each of these is configured in order, you must first start with configuring conditions, which are then added to your...