Key concepts in network security director - AWS WAF, AWS Firewall Manager, AWS Shield Advanced, and AWS Shield network security director

Introducing a new console experience for AWS WAF

You can now use the updated experience to access AWS WAF functionality anywhere in the console. For more details, see Working with the console.

Key concepts in network security director

Note

AWS Shield network security director is in public preview release and is subject to change.

Resources

The compute, networking, and security resources that handle your application traffic:

  • Compute – Amazon Elastic Compute Cloud instances

  • Networking – Application Load Balancers, Amazon API Gateways, Amazon CloudFront distributions, VPC subnets, and VPC elastic network interfaces (ENIs)

  • Security – AWS WAF web ACLs, VPC security groups, and VPC network access control lists (NACLs)

Findings

Alerts about missing or misconfigured network security services, with severity levels of NONE, INFORMATIONAL, LOW, MEDIUM, HIGH, or CRITICAL. network security director generates findings by evaluating configuration settings and threat intelligence for each resource.

Severity

A measure of a resource's vulnerability to potential security events, based on AWS best practices and threat intelligence. Severity assessment considers both potential vulnerabilities and existing protections. A resource's severity level matches its most severe finding, or shows as none if there are no findings.

Network topology

A visual representation of your network that shows resource connections, internet exposure, and tag-based relationships. Use the topology view to investigate resources and their findings.

Understanding network security director findings

Note

AWS Shield network security director is in public preview release and is subject to change.

Network security director generates specific findings for each type of resource it analyzes. These findings help you identify security issues and take appropriate action. The following table lists all possible findings by resource type.

network security director findings by resource type
Resource type Finding description
Application Load Balancer
  • CloudFront origin is also Internet accessible without CloudFront protections

  • AWS WAF missing bot and scraper rules

  • DDoS activity detected

  • Resource has no firewall attached for protection

  • AWS WAF missing all rules - no protection, possible misconfiguration

  • AWS WAF missing key AWS Managed Rules (IP Reputation, Common Rules, or Bad Inputs)

Amazon API Gateway
  • AWS WAF missing bot and scraper rules

  • Resource has no firewall attached for protection

  • AWS WAF missing all rules - no protection, possible misconfiguration

  • AWS WAF missing key AWS Managed Rules (IP Reputation, Common Rules, or Bad Inputs)

Amazon CloudFront
  • AWS WAF missing bot and scraper rules

  • DDoS activity detected

  • Resource has no firewall attached for protection

  • AWS WAF missing all rules - no protection, possible misconfiguration

  • AWS WAF missing key AWS Managed Rules (IP Reputation, Common Rules, or Bad Inputs)

Amazon Elastic Compute Cloud (EC2) instance
  • Allows unrestricted inbound access (0.0.0.0/0) on all ports

  • Allows unrestricted inbound access (0.0.0.0/0) to RDP port 3389

  • Allows unrestricted inbound access (0.0.0.0/0) to SSH port 22

  • Allows unrestricted outbound access (0.0.0.0/0) on all ports

  • Resource has no firewall attached for protection

  • CloudFront origin is also Internet accessible without CloudFront protections

  • Resource has no firewall attached for protection

  • AWS WAF missing bot and scraper rules

  • AWS WAF missing all rules - no protection, possible misconfiguration

  • AWS WAF missing key AWS Managed Rules (IP Reputation, Common Rules, or Bad Inputs)

VPC security group
  • Allows unrestricted inbound access (0.0.0.0/0) on all ports

  • Allows unrestricted inbound access (0.0.0.0/0) to RDP port 3389

  • Allows unrestricted inbound access (0.0.0.0/0) to SSH port 22

  • Allows unrestricted outbound access (0.0.0.0/0) on all ports

VPC network access control list (NACL)
  • Allows unrestricted inbound access (0.0.0.0/0) on all ports

  • Allows unrestricted inbound access (0.0.0.0/0) to RDP port 3389

  • Allows unrestricted inbound access (0.0.0.0/0) to SSH port 22

  • Allows unrestricted outbound access (0.0.0.0/0) on all ports

AWS WAF web ACL
  • Bot activity detected

  • AWS WAF missing bot and scraper rules

  • AWS WAF WebACL is not associated with any resources

  • AWS WAF missing all rules - no protection, possible misconfiguration

  • AWS WAF missing key AWS Managed Rules (IP Reputation, Common Rules, or Bad Inputs)