Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
AWS Administration - The Definitive Guide. - Second Edition

You're reading from  AWS Administration - The Definitive Guide. - Second Edition

Product type Book
Published in Mar 2018
Publisher Packt
ISBN-13 9781788478793
Pages 358 pages
Edition 2nd Edition
Languages
Author (1):
Yohan Wadia Yohan Wadia
Profile icon Yohan Wadia
Toc

Table of Contents (17) Chapters close

Title Page
Packt Upsell
Contributors
Preface
1. What's New in AWS? 2. Managing EC2 with Systems Manager 3. Introducing Elastic Beanstalk and Elastic File System 4. Securing Workloads Using AWS WAF 5. Governing Your Environments Using AWS CloudTrail and AWS Config 6. Access Control Using AWS IAM and AWS Organizations 7. Transforming Application Development Using the AWS Code Suite 8. Messaging in the Cloud Using Amazon SNS and Amazon SQS 9. Powering Analytics Using Amazon EMR and Amazon Redshift 10. Orchestrating Data using AWS Data Pipeline 11. Connecting the World with AWS IoT and AWS Greengrass 1. Other Books You May Enjoy Index

Getting started with WAF


In this section, we are going to look at a few simple and easy-to-follow steps for getting started with AWS WAF. For demonstration purposes, we will be leveraging the same environments and application that we deployed from our previous chapter here, so, if you haven't gone through the use case, this might be a good time for a quick revisit!

In the previous chapter, we leveraged Elastic Beanstalk as well as Elastic File System services to deploy a scalable and highly available WordPress application over the internet. In this section, we will leverage the same setup and secure it even further by introducing AWS WAF into it. Why use WAF for our WordPress application? Well, the simplest answer is to completely abstract the security checks from the underlying web server instance(s), and instead place the security checks at the point of entry of our application, as depicted in the following diagram:

To get started, you will first need to ensure that your WordPress application...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at ₹800/month. Cancel anytime