You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,13 +17,13 @@ Note: If you want to use the solution without building from source, navigate to
17
17
<aname="solution-overview"></a>
18
18
# Solution Overview
19
19
20
-
The AWS DevOps Monitoring Dashboard solution is a reference implementation that automatically deploys a set of AWS WAF (web application firewall) rules that filter common web-based attacks. Users can select from preconfigured protective features that define the rules included in an AWS WAF web access control list (web ACL). Once deployed, AWS WAF protects your Amazon CloudFront distributions or Application Load Balancers by inspecting web requests.
20
+
The Security Automations for AWS WAF solution is a reference implementation that automatically deploys a set of AWS WAF (web application firewall) rules that filter common web-based attacks. Users can select from preconfigured protective features that define the rules included in an AWS WAF web access control list (web ACL). Once deployed, AWS WAF protects your Amazon CloudFront distributions or Application Load Balancers by inspecting web requests.
21
21
22
22
You can use AWS WAF to create custom, application-specific rules that block attack patterns to ensure application availability, secure resources, and prevent excessive resource consumption.
23
23
24
24
This solution can be easily installed in your AWS accounts via launching the provided AWS CloudFormation template.
25
25
26
-
For a detailed solution implementation guide, refer to Solution Landing Page [AWS WAF Security Automations](https://aws.amazon.com/solutions/implementations/aws-waf-security-automations)
26
+
For a detailed solution implementation guide, refer to Solution Landing Page [Security Automations for AWS WAF](https://aws.amazon.com/solutions/implementations/aws-waf-security-automations)
27
27
28
28
<aname="architecture-diagram"></a>
29
29
# Architecture Diagram
@@ -33,7 +33,7 @@ For a detailed solution implementation guide, refer to Solution Landing Page [AW
33
33
<br/>
34
34
</p>
35
35
36
-
AWS WAF Security Automations architecture
36
+
Security Automations for AWS WAF architecture
37
37
38
38
AWS Managed Rules (A): This set of AWS managed core rules provides protection against exploitation of a wide range of common application vulnerabilities or other unwanted traffic.
* From your designated Amazon S3 bucket where you uploaded the deployment assets, copy the link location for the aws-waf-security-automations.template.
124
-
* Using AWS CloudFormation, launch the AWS WAF Security Automations solution stack using the copied Amazon S3 link for the aws-waf-security-automations.template.
124
+
* Using AWS CloudFormation, launch the Security Automations for AWS WAF solution stack using the copied Amazon S3 link for the aws-waf-security-automations.template.
125
125
126
126
#### _Note:_ When deploying the template for CloudFront endpoint, you can launch it only from us-east-1 region.
127
127
@@ -152,4 +152,4 @@ This solution collects anonymous operational metrics to help AWS improve the qua
152
152
<aname="license"></a>
153
153
# License
154
154
155
-
See license [here](https://github.com/awslabs/aws-waf-security-automations/blob/master/LICENSE.txt)
155
+
See license [here](https://github.com/awslabs/aws-waf-security-automations/blob/master/LICENSE.txt)
0 commit comments