Book Image

AWS SysOps Cookbook - Second Edition

By : Eric Z. Beard, Rowan Udell, Lucas Chan
Book Image

AWS SysOps Cookbook - Second Edition

By: Eric Z. Beard, Rowan Udell, Lucas Chan

Overview of this book

AWS is an on-demand remote computing service providing cloud infrastructure over the internet with storage, bandwidth, and customized support for APIs. This updated second edition will help you implement these services and efficiently administer your AWS environment. You will start with the AWS fundamentals and then understand how to manage multiple accounts before setting up consolidated billing. The book will assist you in setting up reliable and fast hosting for static websites, sharing data between running instances and backing up data for compliance. By understanding how to use compute service, you will also discover how to achieve quick and consistent instance provisioning. You’ll then learn to provision storage volumes and autoscale an app server. Next, you’ll explore serverless development with AWS Lambda, and gain insights into using networking and database services such as Amazon Neptune. The later chapters will focus on management tools like AWS CloudFormation, and how to secure your cloud resources and estimate costs for your infrastructure. Finally, you’ll use the AWS well-architected framework to conduct a technology baseline review self-assessment and identify critical areas for improvement in the management and operation of your cloud-based workloads. By the end of this book, you’ll have the skills to effectively administer your AWS environment.
Table of Contents (15 chapters)

Configuring AWS WAF

Web application firewalls are a critical component to any secure web application. AWS WAF allows you to easily set up protection for your applications that are running on a variety of AWS services, including the following:

  • Amazon CloudFront
  • Amazon EC2
  • Amazon Elastic Load Balancer
  • Amazon API Gateway

AWS WAF protects you from a wide variety of common exploits that plague web applications, allowing you to configure rules by IP address and HTTP headers. It is even capable of detecting and stopping SQL injection attacks, which are some of the most common ways that data is exfiltrated from an application that is running on the internet.

How to do it...

In this recipe, you will configure WAF to run on top of...