Linkedin

Securing Custom Origins with AWS WAF

Project Overview

Project Detail

Amazon CloudFront injects a secret custom header into the request and re-directs the request to the onpremises web application. The web application is configured to drop or block any request that arrives without the secret custom header added by Amazon CloudFront. This ensures all traffic is inspected by AWS WAF, protecting the application from direct access. Users receive the response to their request as normal from Amazon CloudFront. Data is then cached at the edge location for the next request. The secret header rotation and deployment process is orchestrated by an AWS Step Functions workflow on a configurable schedule The AWS Step Functions workflow generates a new secret for the custom header value and stores it in AWS Parameter Store. The new header value is added to one or more web app servers via the AWS Systems Manager Agent (AWS SSM Agent) and Automation Runbooks using deployment strategies like rolling updates with error controls. When finalized, it deploys the new header to Amazon CloudFront. After waiting for propagation to all edge locations, the old secret is removed from the web apps The on-premise firewall is updated to allow only the AWS CloudFront IP addresses to the web application as an additional protection layer to prevent direct access by users

http://chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://d1.awsstatic.com/architecture-diagrams/ArchitectureDiagrams/securing-custom-origins-with-aws-waf-ra.pdf?did=wp_card&trk=wp_card

To know more about this project connect with us

Securing Custom Origins with AWS WAF