test - no h2
The Secret Life of AWS: The Perimeter (AWS WAF & AWS Shield) (Part 52 of The Secret Life of AWS) Subtitle: How to filter malicious traffic at the global edge. Tags: #aws #waf #security #architecture #cloudfront #devops Timothy was reviewing the CloudWatch dashboards for his newly deployed global architecture. The CloudFront distribution was successfully serving users in milliseconds, but he noticed an alarming anomaly. "We have a massive spike in traffic hitting the Checkout API," Timothy explained to Margaret, pulling up the X-Ray traces. "But these are not normal user requests. Someone is sending thousands of requests per minute from a handful of IP addresses. And look at the request payloads—they are injecting raw SQL commands into the URL parameters." Margaret leaned in to examine the logs. "You are experiencing an application-layer attack. CloudFront is doing exactly what it was designed to do: it is delivering traffic to your API Gateway as fast a...