P request proceeds to CloudFront. 5 Create a service using DynamoDB for fingerprint information about requesters. 4a Use AWS Lambda@Edgeto intercept the HTTP request to the CloudFront distribution. Write custom logic to make external HTTP requests. API calls to AWS services then process or reject the request. 3 Use AWS Web Application Firewallto create/update rules to block common attack patterns or filter out traffic patterns, such as known bad IP lists, HTTP headers, or URI strings. Rules can be programmatically updated. 2 Traffic hits the endpoints from a variety of sources, such as a website, mobile app, or bot/scraper. 1