Here's a quick round up of the topics that we have covered so far in this chapter.
We started off by learning and understanding a bit about the Web Application Firewall service and how it works to protect against potential security threats and exploits. We later looked at how to get started with WAF by safeguarding our previously deployed WordPress application against restrictive access by leveraging the IP Match, as well as the string/regex match conditions. We also looked at how to mitigate and safeguard your applications by leveraging advanced WAF conditions in the form of SQL injection and cross-site scripting. Towards the end, we covered how to leverage certain pre-built CloudFormation templates to automate the deployments of our WAF rules and, finally, we concluded the chapter with a brief introduction to AWS Shield and its various tiers.
In the next chapter...