Summary

Here's a quick round up of the topics that we have covered so far in this chapter.

We started off by learning and understanding a bit about the Web Application Firewall service and how it works to protect against potential security threats and exploits. We later looked at how to get started with WAF by safeguarding our previously deployed WordPress application against restrictive access by leveraging the IP Match, as well as the string/regex match conditions. We also looked at how to mitigate and safeguard your applications by leveraging advanced WAF conditions in the form of SQL injection and cross-site scripting. Towards the end, we covered how to leverage certain pre-built CloudFormation templates to automate the deployments of ...

Get AWS Administration : The AWS Definitive Guide to core AWS service offerings and implementing AWS in your own environment now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.