AWS Solutions Architect Exam  >  AWS Solutions Architect Notes  >  : Associate Level  >  Cheat Sheet: WAF, Shield & Firewall Manager

Cheat Sheet: WAF, Shield & Firewall Manager

1. AWS WAF (Web Application Firewall)

1.1 Core Concepts

ComponentDescription
AWS WAFLayer 7 firewall that protects web applications from common web exploits
Web ACLWeb Access Control List containing rules that define traffic inspection and action
RulesStatements that define inspection criteria for web requests
Rule GroupsReusable collections of rules that can be managed independently
Rule PriorityNumeric value determining evaluation order (lower numbers evaluated first)

1.2 Supported Resources

  • Amazon CloudFront distributions
  • Application Load Balancer (ALB)
  • Amazon API Gateway REST APIs
  • AWS AppSync GraphQL APIs
  • Amazon Cognito user pools
  • AWS App Runner services
  • AWS Verified Access instances

1.3 Rule Actions

ActionBehavior
AllowPermits the request to reach the protected resource
BlockReturns HTTP 403 Forbidden response to the client
CountCounts matching requests without taking action; used for testing
CAPTCHARequires user to complete CAPTCHA challenge before allowing request
ChallengeSends silent browser challenge to verify legitimate client

1.4 Match Conditions

  • IP addresses (single IP, CIDR ranges, IP sets)
  • Country or geographic location (geo match)
  • HTTP headers, method, query strings
  • URI path
  • Request body (first 8192 bytes for ALB/API Gateway, first 64KB for CloudFront)
  • SQL injection attack patterns
  • Cross-site scripting (XSS) patterns
  • Request size constraints
  • Regex pattern sets
  • Label match statements

1.5 Rate-Based Rules

FeatureDetails
Default Rate LimitMinimum of 100 requests per 5-minute period from single IP
Custom Rate LimitsCan set higher thresholds (100 to 2,000,000,000 requests)
Aggregation KeyIP address, forwarded IP, custom header, or custom key combinations
ScopeCan scope rate limiting to requests matching specific conditions

1.6 Managed Rule Groups

1.6.1 AWS Managed Rules

  • Core Rule Set (CRS) - OWASP Top 10 protections
  • Admin Protection - blocks access to admin pages
  • Known Bad Inputs - blocks patterns associated with exploit attempts
  • SQL Database - protects against SQL injection
  • Linux Operating System - protects against Linux-specific attacks
  • Windows Operating System - protects against Windows-specific attacks
  • PHP Application - protects against PHP-specific vulnerabilities
  • WordPress Application - protects WordPress sites
  • Anonymous IP List - blocks requests from anonymizing services, VPNs, Tor
  • IP Reputation List - blocks known malicious IP addresses
  • Bot Control - detects and manages bot traffic
  • Account Takeover Prevention (ATP) - protects login pages
  • Fraud Control Account Creation Fraud Prevention (ACFP) - protects signup pages

1.6.2 AWS Marketplace Managed Rules

  • Third-party security vendors provide specialized rule groups
  • Subscription-based pricing model
  • Includes vendor-specific threat intelligence

1.7 Custom Rules and Rule Groups

  • Maximum 10 rules per Web ACL when using only custom rules
  • Each managed rule group counts as 1 rule
  • Web ACL capacity units (WCUs) determine complexity (max 5000 WCUs per Web ACL)
  • Simple rules consume fewer WCUs; complex rules consume more
  • Custom rule groups can be shared across multiple Web ACLs

1.8 Logging and Monitoring

FeatureDetails
CloudWatch MetricsAllowedRequests, BlockedRequests, CountedRequests, PassedRequests
Logging DestinationsS3 bucket, CloudWatch Logs, Kinesis Data Firehose
Sampled RequestsConsole displays sample of requests matching rules (last 3 hours, max 500 samples)
Log FieldsTimestamp, action, ruleId, terminatingRuleId, httpRequest details, labels
RedactionCan redact sensitive fields from logs (headers, cookies, URI)

1.9 Pricing Model

  • Per Web ACL: $5.00/month
  • Per Rule on Web ACL: $1.00/month per rule
  • Per million requests: $0.60
  • Bot Control pricing: additional $10/month + $1 per million requests analyzed
  • CAPTCHA pricing: $0.40 per 1,000 CAPTCHA attempts
  • Marketplace managed rules have additional subscription fees

2. AWS Shield

2.1 Shield Standard

FeatureDetails
CostFree, automatically enabled for all AWS customers
Protection LevelLayer 3 (Network) and Layer 4 (Transport) DDoS protection
Protected ServicesCloudFront, Route 53, Elastic Load Balancing, AWS Global Accelerator
Attack TypesSYN/ACK floods, reflection attacks, UDP floods
DetectionAutomatic detection and inline mitigation

2.2 Shield Advanced

FeatureDetails
Cost$3,000/month per organization + data transfer fees
Protection LevelEnhanced Layer 3, Layer 4, and Layer 7 DDoS protection
Protected ResourcesEC2 Elastic IPs, CloudFront, Route 53, ALB, NLB, CLB, Global Accelerator
Resource LimitsUp to 1,000 protected resources per account
DDoS Cost ProtectionCredits for scaling charges during DDoS attacks (shields against bill shock)

2.3 Shield Advanced Exclusive Features

  • 24/7 access to DDoS Response Team (DRT)
  • Advanced real-time metrics and attack notifications via CloudWatch
  • Historical attack analytics and reports
  • DDoS-specific Web ACL rules and rate-based rules
  • Layer 7 attack mitigation with automatic WAF rule creation
  • Health-based detection for Route 53 health checks
  • Proactive engagement - DRT initiates contact during events
  • Application layer DDoS protection visibility
  • Global threat environment dashboard

2.4 DRT Permissions

  • Requires explicit IAM role authorization to access account
  • Can authorize DRT to modify WAF rules and Shield protections on your behalf
  • DRT can create or update WAF rules during active attack
  • Customer retains full control; DRT acts only when authorized

2.5 Shield Advanced Integration

ServiceIntegration Capability
AWS WAFIncluded at no extra cost; automatic rule suggestions during attacks
CloudWatchDDoSDetected, DDoSAttackBitsPerSecond, DDoSAttackPacketsPerSecond metrics
Route 53Health-based detection monitors health check status changes
AWS Firewall ManagerCentralized management of Shield Advanced protections across accounts

2.6 Attack Visibility and Notifications

  • Real-time notification via CloudWatch Events/EventBridge
  • SNS integration for alerting
  • Attack vectors identified: SYN flood, UDP flood, DNS query flood, HTTP flood
  • Attack duration, volume, and mitigation actions logged
  • Historical attack data retained for trend analysis

3. AWS Firewall Manager

3.1 Core Concepts

ComponentDescription
Firewall ManagerCentral security management service for firewall rules across AWS Organization
Security PoliciesSets of rules applied to accounts and resources in scope
Administrator AccountDesignated account that manages policies for entire organization
Policy ScopeDefines which accounts, OUs, resource types, and tags policies apply to

3.2 Prerequisites

  • AWS Organizations must be enabled
  • Must designate Firewall Manager administrator account
  • AWS Config must be enabled in all accounts and regions where policies apply
  • Resources must be tagged if using tag-based policy scope

3.3 Supported Policy Types

Policy TypeFunction
AWS WAFManages WAF rules across ALB, API Gateway, CloudFront, AppSync
Shield AdvancedAutomates Shield Advanced protection for resources
VPC Security GroupsManages security group rules across VPCs and accounts
Network FirewallDeploys and manages Network Firewall across VPCs
Route 53 Resolver DNS FirewallManages DNS filtering rules across VPCs
Third-party FirewallsPalo Alto Networks Cloud NGFW, Fortigate Cloud Native Firewall

3.4 WAF Policy Configuration

3.4.1 Rule Group Options

  • First rule groups: evaluated before resource-specific rules
  • Last rule groups: evaluated after resource-specific rules
  • Can use AWS Managed Rules, Marketplace rules, or custom rule groups
  • Override actions: convert rule group actions to Count for testing

3.4.2 Policy Deployment Models

ModelBehavior
Automatic RemediationFirewall Manager creates and manages Web ACLs automatically
Monitor ModeIdentifies non-compliant resources without enforcement
Replace ExistingReplaces any existing Web ACLs with policy-defined configuration

3.5 Security Group Policies

3.5.1 Common Security Group Policy

  • Applies baseline security group rules across resources
  • Can add rules to existing security groups or replace them
  • Supports primary and replica security groups

3.5.2 Auditing Security Group Policy

  • Identifies overly permissive rules
  • Detects unused security groups
  • Checks for rules violating compliance standards
  • Auto-remediation can remove non-compliant rules

3.5.3 Content Audit Security Group Policy

  • Allows only specified rules; blocks all others
  • Enforces strict allow-list approach
  • Auto-remediation removes unauthorized rules

3.6 Policy Scope Configuration

Scope ElementOptions
AccountsAll accounts in organization, specific OUs, include/exclude lists
Resource TypesCloudFront, ALB, API Gateway, EC2, etc.
ResourcesAll resources, or filter by resource tags
RegionsAll regions or specific region list (CloudFront is Global)

3.7 Compliance and Monitoring

  • Compliance status dashboard shows compliant vs non-compliant resources
  • Non-compliance reasons logged (missing protection, incorrect configuration)
  • SNS notifications for compliance status changes
  • CloudWatch metrics for policy compliance
  • Automatic remediation brings resources into compliance
  • Manual remediation requires administrator action

3.8 Firewall Manager Pricing

  • Per policy: $100/month per region per policy
  • Per resource: varies by resource type and policy type
  • WAF policy: $0.0002 per resource per month
  • Shield Advanced policy: no additional charge beyond Shield Advanced fees
  • Security Group policies: $0.0002 per VPC per month
  • Underlying service costs still apply (WAF, Shield Advanced, etc.)

4. Integration and Architecture Patterns

4.1 Multi-Layer Protection Architecture

LayerService
Edge ProtectionCloudFront with Shield Standard, Route 53 with Shield Standard
DDoS MitigationShield Advanced on CloudFront, ALB, Route 53
Application LayerWAF on CloudFront/ALB with managed and custom rules
Network LayerSecurity groups, Network ACLs, Network Firewall

4.2 Regional vs Global Services

ServiceScope
WAF for CloudFrontMust be created in us-east-1 region
WAF for ALB/API GatewayMust be in same region as protected resource
Shield StandardGlobal protection automatically applied
Shield AdvancedApplied per resource; global visibility dashboard
Firewall ManagerPolicies can span all regions or specific regions

4.3 Cross-Account Management

  • Firewall Manager manages policies across AWS Organization accounts
  • Shield Advanced supports consolidated billing at organization level
  • WAF Web ACLs can be shared via AWS Resource Access Manager (RAM)
  • DRT requires IAM role in each account for Shield Advanced access
  • Central logging account collects WAF logs from all accounts

4.4 Common Use Cases

Use CaseRecommended Solution
Block SQL injectionWAF with SQL Database Managed Rule Group
Prevent credential stuffingWAF Account Takeover Prevention (ATP) on login endpoints
Rate limiting APIWAF rate-based rule on API Gateway
Block specific countriesWAF geo match condition
DDoS protection for public websiteCloudFront + Shield Standard + WAF (Shield Advanced for SLA)
Centralized security across organizationFirewall Manager with WAF and Shield Advanced policies
Bot detection and managementWAF Bot Control Managed Rule Group

4.5 WAF Rule Evaluation Order

  1. Rules evaluated in priority order (lowest number first)
  2. First matching terminating rule action is taken
  3. If no terminating rule matches, default Web ACL action applies (Allow or Block)
  4. Count actions are non-terminating; evaluation continues
  5. Rule group rules evaluated in group's internal priority order

4.6 Performance and Limits

ResourceLimit
Web ACLs per region100 (soft limit, can be increased)
Rules per Web ACL10 individual rules or rule groups (can be increased)
Web ACL capacity units5,000 WCUs per Web ACL
Rate-based rule minimum100 requests per 5 minutes
IP sets per region100
IP addresses per IP set10,000
Regex pattern sets per region10
Shield Advanced protected resources1,000 per account

5. Best Practices and Exam Tips

5.1 WAF Best Practices

  • Start with AWS Managed Rules Core Rule Set for baseline protection
  • Use Count mode to test rules before switching to Block
  • Enable logging to S3 or CloudWatch Logs for analysis
  • Implement rate-based rules to prevent abuse and DDoS
  • Use IP sets for allow-lists and deny-lists; easier to manage than individual rules
  • Apply WAF at CloudFront for global protection; at ALB for regional applications
  • Review sampled requests regularly to tune rules
  • Use labels to create complex rule logic and improve rule organization

5.2 Shield Best Practices

  • Shield Standard is automatic and free; always enabled
  • Use Shield Advanced for business-critical applications requiring SLA
  • Enable Shield Advanced on CloudFront and Route 53 for edge protection
  • Configure health-based detection for faster DDoS response
  • Grant DRT proactive permissions before attacks occur
  • Review DDoS cost protection to understand coverage scope
  • Combine Shield Advanced with WAF for comprehensive protection

5.3 Firewall Manager Best Practices

  • Enable AWS Config in all accounts and regions before deploying policies
  • Use organizational units (OUs) to group accounts with similar security requirements
  • Start with monitor mode, then enable auto-remediation after validation
  • Use tag-based scoping for flexible resource targeting
  • Implement both common and audit security group policies for defense in depth
  • Set up SNS notifications to track compliance drift
  • Designate a dedicated security account as Firewall Manager administrator

5.4 Cost Optimization

  • Use WAF only where needed; not all resources require WAF
  • Shield Standard provides adequate protection for most workloads
  • Shield Advanced at organization level reduces per-account costs
  • Consolidate Web ACLs using resource tagging where appropriate
  • Monitor WCU consumption to avoid unnecessary rule complexity
  • Use Firewall Manager to prevent policy sprawl and duplicate rules

5.5 Security Considerations

  • Never expose EC2 instances directly; use CloudFront or ALB with WAF
  • WAF does not inspect encrypted traffic payload; only headers and metadata
  • Combine WAF with other services: GuardDuty, Security Hub, Inspector
  • Use AWS Managed Rules for known vulnerabilities; custom rules for business logic
  • Regularly update IP reputation lists and bot detection rules
  • Implement least privilege for WAF and Shield administrative access
  • Enable MFA delete on S3 buckets storing WAF logs

5.6 Troubleshooting Common Issues

IssueSolution
Legitimate traffic blockedReview sampled requests; adjust rule priority or add exceptions
High false positive rateUse Count mode; tune match conditions; adjust sensitivity settings
WAF not blocking attacksVerify Web ACL associated with resource; check rule priority and actions
Firewall Manager non-complianceEnsure AWS Config enabled; verify resource tags; check policy scope
DRT cannot access accountVerify IAM role created; check trust policy; confirm authorization granted

5.7 Key Exam Scenarios

  • Scenario: Block traffic from specific countries → Use WAF geo match condition
  • Scenario: Protect against DDoS with cost guarantee → Use Shield Advanced
  • Scenario: Centralized firewall rules across 100 accounts → Use Firewall Manager
  • Scenario: Prevent SQL injection on web app → Use WAF SQL Database Managed Rule Group
  • Scenario: Rate limit API to 1000 req/5min per IP → Use WAF rate-based rule
  • Scenario: Monitor potential threats without blocking → Use WAF Count action
  • Scenario: Protect login page from credential stuffing → Use WAF ATP
  • Scenario: Automatically respond to Layer 7 DDoS → Use Shield Advanced with DRT authorization
The document Cheat Sheet: WAF, Shield & Firewall Manager is a part of the AWS Solutions Architect Course AWS Solutions Architect: Associate Level.
All you need of AWS Solutions Architect at this link: AWS Solutions Architect
Explore Courses for AWS Solutions Architect exam
Get EduRev Notes directly in your Google search
Related Searches
study material, Summary, MCQs, Exam, Viva Questions, Cheat Sheet: WAF, past year papers, Shield & Firewall Manager, pdf , Objective type Questions, Free, Cheat Sheet: WAF, video lectures, Shield & Firewall Manager, Extra Questions, practice quizzes, Cheat Sheet: WAF, Previous Year Questions with Solutions, Shield & Firewall Manager, mock tests for examination, Important questions, shortcuts and tricks, Sample Paper, Semester Notes, ppt;