Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added Support for FMS Advanced Shield policies #418

Closed
wants to merge 87 commits into from
Closed

Conversation

memehadi
Copy link
Collaborator

@memehadi memehadi commented Jul 8, 2024

Added
Added support for deploying Shield Advanced policies, including the ability to calculate pricing. AWS Shield Advanced provides customized detection based on traffic patterns to your protected resources, detects and alerts on smaller DDoS attacks, and identifies application layer attacks by baselining traffic and spotting anomalies.
For Shield Advanced policies, we have introduced an Advanced Shield stack with sample configurations.
Note: If you are deploying WAF in a CI/CD environment, make sure you set your environment variable STACK_NAME for the resource you want to deploy.
export STACK_NAME=PreRequisiteStack => _prerequisites-stack.ts
export STACK_NAME=WAFStack => _web-application-firewall-stack.ts
export STACK_NAME=ShieldAdvancedStack => _shield-advanced-stack.ts
Add Shield Cloudwatch Dashboard - Example Shield Dashboard- The Firewall Factory is able to provision a centralized CloudWatch Dashboard.
Add Cloudwatch Alarms: Cloudwatch Alarms are now part of the prerequisite stack and can be used to triger the SNS topics incase of DDoS.
The Dashboard shows the ammount of DDoS attacks detected
#358 Add Grafana Dashbording - Example Grafana Dashboard- AWS Glue crawler job, an Amazon Athena table and an Amazon Athena view to build a Managed Grafana dashboard to visualize the events in near real time - This is an optional component in the Prequisite Stack.
Example Grafana Dashboard can be found here
Note:
Your need to configure Amazon Athena Data Source in Amazon Managed Grafana
Example Role template for Cross Account Access can be found here
⚠️ You need to adjust the json and replace the uid of your grafana-athena-datasource - while importing into your Grafana.
Fixed
Bump @aws-sdk/client-cloudformation to 3.606.0
Bump @aws-sdk/client-cloudfront to 3.606.0
Bump @aws-sdk/client-cloudwatch to 3.606.0
Bump @aws-sdk/client-config-service to 3.606.0
Bump @aws-sdk/client-ec2 to 3.606.0
Bump @aws-sdk/client-fms to 3.606.0
Bump @aws-sdk/client-pricing to 3.606.0
Bump @aws-sdk/client-s3 to 3.606.0
Bump @aws-sdk/client-iam to 3.606.0
Bump @aws-sdk/client-secrets-manager to 3.606.0
Bump @aws-sdk/client-service-quotas to 3.606.0
Bump @aws-sdk/client-shield to 3.606.0
Bump @aws-sdk/client-ssm to 3.606.0
Bump @aws-sdk/client-wafv2 to 3.606.0
Bump @aws-solutions-constructs/aws-eventbridge-stepfunctions to 2.60.0
Bump @babel/traverse to 7.24.7
Bump @mhlabs/cfn-diagram to 1.1.40
Bump @slack/types to 2.12.0
Bump @types/aws-lambda to 8.10.140
Bump @types/lodash to 4.17.6
Bump @types/uuid to 10.0.0
Bump adaptivecards to 3.0.4
Bump aws-cdk-lib to 2.148.0
Bump axios to 1.7.2
Bump cdk-sops-secrets to 1.12.0
Bump cfonts to 3.3.0
Bump npm to 10.8.1
Bump table to 6.8.2
Bump uuid to 10.0.0
Bump @types/node to 20.14.9
Bump @typescript-eslint/eslint-plugin to 7.14.1
Bump @typescript-eslint/parser to 7.14.1
Bump aws-cdk to 2.147.2
Bump ts-jest to 29.1.5

Jovan Cusic and others added 30 commits June 20, 2024 13:24
…ded an example,updated the shield stack to use standard naming
@daknhh daknhh closed this Jul 8, 2024
@daknhh daknhh deleted the advancedShield branch July 8, 2024 15:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants