AWS WAF

AWS WAF – Detailed Notes

AWS WAF in AWS Cloud Security

AWS WAF (Web Application Firewall) is a managed security service provided by Amazon Web Services that helps protect web applications and APIs from malicious traffic, vulnerabilities, and automated attacks. With increasing cyber threats, including SQL injection, cross-site scripting (XSS), bot attacks, DDoS attempts, credential stuffing, and OWASP Top 10 vulnerabilities, organizations rely on AWS WAF to safeguard applications running on Amazon CloudFront, Application Load Balancer (ALB), API Gateway, AWS AppSync, and AWS App Runner. The service delivers scalability, automation, low-latency application protection, advanced rule customization, and seamless integration with AWS security services like AWS Shield, AWS Firewall Manager, and Amazon GuardDuty.

This document provides a deeply detailed and unique explanation of AWS WAF, its architecture, major components, configuration steps, rule types, real-world use cases, and best practices. It also includes SEO-friendly keywords such as AWS WAF tutorial, AWS WAF rules, AWS WAF vs Shield, AWS WAF pricing, AWS WAF security automation, CloudFront WAF protection, OWASP Top 10 mitigation using AWS WAF, and more.

What is AWS WAF?

AWS WAF is a cloud-based web application firewall that monitors HTTP and HTTPS requests and filters them based on customizable web access control lists (web ACLs). It allows developers and security teams to define rule-based protections for web applications against common exploits and attacks. Unlike traditional firewalls, AWS WAF is fully managed, scalable, and integrates directly with AWS services without requiring infrastructure maintenance.

AWS WAF operates at Layer 7 (application layer) of the OSI model, giving fine-grained control over web requests such as headers, query strings, cookies, and body content. This allows teams to create rules that detect intrusion attempts, anomalies, and malicious behavior.

Why AWS WAF Is Important

Modern applications and APIs face sophisticated threats. Attackers attempt to steal sensitive data, exploit application vulnerabilities, perform reconnaissance, and overwhelm systems with malicious requests. AWS WAF helps mitigate risks through:

  • Protection against OWASP Top 10 vulnerabilities
  • DDoS mitigation when used with AWS Shield
  • Blocking malicious bots and scrapers
  • Rate limiting and throttling abusive traffic
  • Preventing brute-force login attempts
  • Securing APIs from injection attacks
  • Monitoring and logging security events in real-time

Because AWS WAF is deployed at AWS edge locations through CloudFront or at application endpoints such as ALB and API Gateway, it offers high-speed filtering without introducing additional latency.

Core Components of AWS WAF

1. Web ACL (Web Access Control List)

A Web ACL is the main container for AWS WAF rules. It defines what traffic is allowed, blocked, or counted. A single web ACL can be associated with CloudFront distributions, ALBs, API Gateway stages, or AppSync APIs.

A Web ACL includes:

  • Rules
  • Default action (allow/block)
  • Rules priority
  • Logging configuration

2. Rules

Rules are the fundamental building blocks of AWS WAF. They define the criteria for evaluating incoming traffic. Rules can match based on IP addresses, HTTP request patterns, query strings, request body, headers, cookies, or custom expressions. Rules can also be created manually or purchased from AWS Marketplace.

Examples include:

  • IP match conditions
  • Geographic match rules
  • Size constraint rules
  • Rate-based rules
  • Regex match rules
  • SQL injection rule groups
  • XSS rule groups

3. Rule Groups

Rule groups bundle multiple rules together. They can be AWS-managed, partner-managed, or user-created. Rule groups allow reusable, packaged security functionalityβ€”for example, grouping all SQL injection detection rules together.

Types of rule groups:

  • AWS Managed Rule Groups
  • Marketplace Partner Rule Groups
  • Custom Rule Groups

4. Managed Rule Groups

AWS offers several pre-configured rule groups to protect applications immediately without custom rule creation. These rule groups cover common exploits, bots, and known threat vectors. They include protections for OWASP Top 10 vulnerabilities, anonymous IP providers, Linux/Apache threats, malicious bot traffic, and more.

5. Conditions

Conditions define what the rule inspectsβ€”for example, checking for certain text strings in a request body or identifying a malicious user agent. Conditions let you match portions of HTTP requests, including:

  • URI paths
  • Query strings
  • Cookies
  • Headers
  • JSON body
  • IP addresses
  • Request size

6. Actions

AWS WAF evaluates rule actions in the order of priority:

  • Allow
  • Block
  • Count
  • CAPTCHA
  • Challenge
  • Rate-based throttling

Newer features like CAPTCHA and Challenge actions provide bot mitigation without affecting legitimate users.

How AWS WAF Works

AWS WAF intercepts web requests at edge locations or application-level endpoints and evaluates them against web ACL rules. If a request matches a rule, the action is executed (block, allow, count). Logging provides visibility into traffic patterns.

An AWS WAF workflow typically includes:

  1. Traffic arrives at CloudFront, ALB, or API Gateway.
  2. A Web ACL evaluates the request in rule priority order.
  3. Matching rules apply actions like allow, block, CAPTCHA, or challenge.
  4. Comprehensive logs are sent to Amazon Kinesis, S3, or CloudWatch.

Supported AWS Services

AWS WAF can be attached to:

  • Amazon CloudFront
  • Application Load Balancer (ALB)
  • Amazon API Gateway
  • AWS AppSync
  • AWS App Runner
  • AWS Cognito (limited integrations)

AWS WAF Rule Types (Detailed)

1. IP Match Rules

IP rules block or allow traffic from specific IP addresses or CIDR ranges. Useful for IP-based blocking, geo-blocking combined with IP sets, or restricting private API access.

2. Rate-Based Rules

Rate-based rules help mitigate abuse from excessive requests by blocking or throttling IPs that exceed a defined request threshold within a 5-minute window.

Example use cases:

  • Prevent brute-force login attacks
  • Mitigate DDoS attempts
  • Block API scrapers or bots

3. SQL Injection Match Rules

AWS WAF can detect common SQL injection attempts by inspecting user input across headers, query strings, and bodies.

4. Cross-Site Scripting (XSS) Rules

Detects attempts to inject malicious scripts into web pages through user inputs.

5. Geo Match Rules

Restrict or allow requests based on the origin country. Useful for compliance or regional traffic control.

6. Regex Match Rules

Use custom regular expressions to match patterns in any part of a request.

7. Size Constraint Rules

Restrict requests that exceed expected size limits, protecting against buffer overflow attempts.

8. Bot Control Rules

Detects and mitigates known bots, scraping tools, and automated scanners.

9. CAPTCHA and Challenge Rules

Useful in preventing bad bot traffic while keeping legitimate user flow intact.

Creating a Web ACL Using AWS CLI

Below is an example of creating a basic Web ACL using the AWS CLI:

aws wafv2 create-web-acl \
  --name "MyWebACL" \
  --scope "CLOUDFRONT" \
  --default-action Allow={} \
  --rules file://rules.json \
  --visibility-config SampledRequestsEnabled=true,CloudWatchMetricsEnabled=true,MetricName="MyWebACLMetric"

Adding a Rate-Based Rule Example

{
  "Name": "LimitRequests",
  "Priority": 1,
  "Statement": {
    "RateBasedStatement": {
      "Limit": 2000,
      "AggregateKeyType": "IP"
    }
  },
  "Action": {
    "Block": {}
  },
  "VisibilityConfig": {
    "SampledRequestsEnabled": true,
    "CloudWatchMetricsEnabled": true,
    "MetricName": "RateLimitRule"
  }
}

Logging and Monitoring in AWS WAF

AWS WAF provides logging options:

  • Amazon Kinesis Data Firehose
  • Amazon S3
  • Amazon CloudWatch Logs

Logs include full request details for threat analysis, debugging, and compliance reports.

Analytics and Insight Tools

1. AWS WAF Security Automations

AWS provides a pre-built solution that deploys Lambda-based workflows to block threats automatically based on anomaly detection.

2. Amazon GuardDuty Integration

Threat intelligence feeds can automatically update AWS WAF IP sets to block malicious IPs.

3. AWS Firewall Manager

For multi-account security, AWS Firewall Manager provides central rule management across all AWS organizations.

Real-World Use Cases of AWS WAF

  • Blocking malicious traffic to e-commerce websites
  • Preventing SQL injection in cloud-hosted APIs
  • Rate limiting login pages to prevent brute-force attacks
  • Blocking bots and scrapers collecting sensitive data
  • Restricting traffic from high-risk or unauthorized regions
  • Adding CAPTCHA verification to reduce fake signups
  • Protecting GraphQL endpoints hosted on AppSync

AWS WAF Deployment Scenarios

1. With Amazon CloudFront

Most common and provides global coverage.

2. With Application Load Balancer (ALB)

Protects backend servers behind ALB for web application traffic.

3. With API Gateway

Provides protection for REST APIs and microservices.

4. Using AWS Firewall Manager

Manages enterprise-wide WAF rules.

Performance Considerations

AWS WAF is designed to operate with minimal latency. Its rule engine evaluates requests efficiently using a deterministic processing model. CloudFront distribution with AWS WAF ensures edge-level filtering before requests reach the backend.

Benefits of Using AWS WAF

  • Fully managed and scalable
  • Automatic updates with AWS managed rules
  • Low latency processing
  • Tightly integrated with AWS edge and compute services
  • Flexible rule customization
  • No maintenance required
  • Real-time monitoring

Limitations of AWS WAF

  • No Layer 3/4 protections (requires AWS Shield)
  • Custom regex rules may affect performance
  • Advanced rule sets may increase cost
  • Complex rule design requires expertise

Pricing Overview

AWS WAF pricing is based on:

  • Web ACL count
  • Rules per web ACL
  • Request volume inspected

There are no upfront commitments; pay-as-you-go pricing ensures flexibility.

Best Practices for AWS WAF

  • Start with AWS Managed Rules for fast protection
  • Use rate-based rules for login endpoints
  • Enable full logging for threat analysis
  • Combine WAF with CloudFront for high performance
  • Use Web ACLs per environment (prod/staging)
  • Integrate with AWS Firewall Manager for organizations
  • Regularly update rule priorities

AWS WAF is a powerful, scalable, and fully managed web application firewall that provides robust protection against threats targeting web applications and APIs. With its wide range of features, support for managed rules, seamless integration with AWS services, and flexible configuration options, AWS WAF is a critical component for organizations looking to secure their cloud environments. Whether you are protecting an e-commerce site, mobile backend API, or enterprise-level digital platform, AWS WAF offers the tools needed to mitigate threats, enforce compliance, and ensure high availability.

logo

AWS

Beginner 5 Hours
AWS WAF – Detailed Notes

AWS WAF in AWS Cloud Security

AWS WAF (Web Application Firewall) is a managed security service provided by Amazon Web Services that helps protect web applications and APIs from malicious traffic, vulnerabilities, and automated attacks. With increasing cyber threats, including SQL injection, cross-site scripting (XSS), bot attacks, DDoS attempts, credential stuffing, and OWASP Top 10 vulnerabilities, organizations rely on AWS WAF to safeguard applications running on Amazon CloudFront, Application Load Balancer (ALB), API Gateway, AWS AppSync, and AWS App Runner. The service delivers scalability, automation, low-latency application protection, advanced rule customization, and seamless integration with AWS security services like AWS Shield, AWS Firewall Manager, and Amazon GuardDuty.

This document provides a deeply detailed and unique explanation of AWS WAF, its architecture, major components, configuration steps, rule types, real-world use cases, and best practices. It also includes SEO-friendly keywords such as AWS WAF tutorial, AWS WAF rules, AWS WAF vs Shield, AWS WAF pricing, AWS WAF security automation, CloudFront WAF protection, OWASP Top 10 mitigation using AWS WAF, and more.

What is AWS WAF?

AWS WAF is a cloud-based web application firewall that monitors HTTP and HTTPS requests and filters them based on customizable web access control lists (web ACLs). It allows developers and security teams to define rule-based protections for web applications against common exploits and attacks. Unlike traditional firewalls, AWS WAF is fully managed, scalable, and integrates directly with AWS services without requiring infrastructure maintenance.

AWS WAF operates at Layer 7 (application layer) of the OSI model, giving fine-grained control over web requests such as headers, query strings, cookies, and body content. This allows teams to create rules that detect intrusion attempts, anomalies, and malicious behavior.

Why AWS WAF Is Important

Modern applications and APIs face sophisticated threats. Attackers attempt to steal sensitive data, exploit application vulnerabilities, perform reconnaissance, and overwhelm systems with malicious requests. AWS WAF helps mitigate risks through:

  • Protection against OWASP Top 10 vulnerabilities
  • DDoS mitigation when used with AWS Shield
  • Blocking malicious bots and scrapers
  • Rate limiting and throttling abusive traffic
  • Preventing brute-force login attempts
  • Securing APIs from injection attacks
  • Monitoring and logging security events in real-time

Because AWS WAF is deployed at AWS edge locations through CloudFront or at application endpoints such as ALB and API Gateway, it offers high-speed filtering without introducing additional latency.

Core Components of AWS WAF

1. Web ACL (Web Access Control List)

A Web ACL is the main container for AWS WAF rules. It defines what traffic is allowed, blocked, or counted. A single web ACL can be associated with CloudFront distributions, ALBs, API Gateway stages, or AppSync APIs.

A Web ACL includes:

  • Rules
  • Default action (allow/block)
  • Rules priority
  • Logging configuration

2. Rules

Rules are the fundamental building blocks of AWS WAF. They define the criteria for evaluating incoming traffic. Rules can match based on IP addresses, HTTP request patterns, query strings, request body, headers, cookies, or custom expressions. Rules can also be created manually or purchased from AWS Marketplace.

Examples include:

  • IP match conditions
  • Geographic match rules
  • Size constraint rules
  • Rate-based rules
  • Regex match rules
  • SQL injection rule groups
  • XSS rule groups

3. Rule Groups

Rule groups bundle multiple rules together. They can be AWS-managed, partner-managed, or user-created. Rule groups allow reusable, packaged security functionality—for example, grouping all SQL injection detection rules together.

Types of rule groups:

  • AWS Managed Rule Groups
  • Marketplace Partner Rule Groups
  • Custom Rule Groups

4. Managed Rule Groups

AWS offers several pre-configured rule groups to protect applications immediately without custom rule creation. These rule groups cover common exploits, bots, and known threat vectors. They include protections for OWASP Top 10 vulnerabilities, anonymous IP providers, Linux/Apache threats, malicious bot traffic, and more.

5. Conditions

Conditions define what the rule inspects—for example, checking for certain text strings in a request body or identifying a malicious user agent. Conditions let you match portions of HTTP requests, including:

  • URI paths
  • Query strings
  • Cookies
  • Headers
  • JSON body
  • IP addresses
  • Request size

6. Actions

AWS WAF evaluates rule actions in the order of priority:

  • Allow
  • Block
  • Count
  • CAPTCHA
  • Challenge
  • Rate-based throttling

Newer features like CAPTCHA and Challenge actions provide bot mitigation without affecting legitimate users.

How AWS WAF Works

AWS WAF intercepts web requests at edge locations or application-level endpoints and evaluates them against web ACL rules. If a request matches a rule, the action is executed (block, allow, count). Logging provides visibility into traffic patterns.

An AWS WAF workflow typically includes:

  1. Traffic arrives at CloudFront, ALB, or API Gateway.
  2. A Web ACL evaluates the request in rule priority order.
  3. Matching rules apply actions like allow, block, CAPTCHA, or challenge.
  4. Comprehensive logs are sent to Amazon Kinesis, S3, or CloudWatch.

Supported AWS Services

AWS WAF can be attached to:

  • Amazon CloudFront
  • Application Load Balancer (ALB)
  • Amazon API Gateway
  • AWS AppSync
  • AWS App Runner
  • AWS Cognito (limited integrations)

AWS WAF Rule Types (Detailed)

1. IP Match Rules

IP rules block or allow traffic from specific IP addresses or CIDR ranges. Useful for IP-based blocking, geo-blocking combined with IP sets, or restricting private API access.

2. Rate-Based Rules

Rate-based rules help mitigate abuse from excessive requests by blocking or throttling IPs that exceed a defined request threshold within a 5-minute window.

Example use cases:

  • Prevent brute-force login attacks
  • Mitigate DDoS attempts
  • Block API scrapers or bots

3. SQL Injection Match Rules

AWS WAF can detect common SQL injection attempts by inspecting user input across headers, query strings, and bodies.

4. Cross-Site Scripting (XSS) Rules

Detects attempts to inject malicious scripts into web pages through user inputs.

5. Geo Match Rules

Restrict or allow requests based on the origin country. Useful for compliance or regional traffic control.

6. Regex Match Rules

Use custom regular expressions to match patterns in any part of a request.

7. Size Constraint Rules

Restrict requests that exceed expected size limits, protecting against buffer overflow attempts.

8. Bot Control Rules

Detects and mitigates known bots, scraping tools, and automated scanners.

9. CAPTCHA and Challenge Rules

Useful in preventing bad bot traffic while keeping legitimate user flow intact.

Creating a Web ACL Using AWS CLI

Below is an example of creating a basic Web ACL using the AWS CLI:

aws wafv2 create-web-acl \ --name "MyWebACL" \ --scope "CLOUDFRONT" \ --default-action Allow={} \ --rules file://rules.json \ --visibility-config SampledRequestsEnabled=true,CloudWatchMetricsEnabled=true,MetricName="MyWebACLMetric"

Adding a Rate-Based Rule Example

{ "Name": "LimitRequests", "Priority": 1, "Statement": { "RateBasedStatement": { "Limit": 2000, "AggregateKeyType": "IP" } }, "Action": { "Block": {} }, "VisibilityConfig": { "SampledRequestsEnabled": true, "CloudWatchMetricsEnabled": true, "MetricName": "RateLimitRule" } }

Logging and Monitoring in AWS WAF

AWS WAF provides logging options:

  • Amazon Kinesis Data Firehose
  • Amazon S3
  • Amazon CloudWatch Logs

Logs include full request details for threat analysis, debugging, and compliance reports.

Analytics and Insight Tools

1. AWS WAF Security Automations

AWS provides a pre-built solution that deploys Lambda-based workflows to block threats automatically based on anomaly detection.

2. Amazon GuardDuty Integration

Threat intelligence feeds can automatically update AWS WAF IP sets to block malicious IPs.

3. AWS Firewall Manager

For multi-account security, AWS Firewall Manager provides central rule management across all AWS organizations.

Real-World Use Cases of AWS WAF

  • Blocking malicious traffic to e-commerce websites
  • Preventing SQL injection in cloud-hosted APIs
  • Rate limiting login pages to prevent brute-force attacks
  • Blocking bots and scrapers collecting sensitive data
  • Restricting traffic from high-risk or unauthorized regions
  • Adding CAPTCHA verification to reduce fake signups
  • Protecting GraphQL endpoints hosted on AppSync

AWS WAF Deployment Scenarios

1. With Amazon CloudFront

Most common and provides global coverage.

2. With Application Load Balancer (ALB)

Protects backend servers behind ALB for web application traffic.

3. With API Gateway

Provides protection for REST APIs and microservices.

4. Using AWS Firewall Manager

Manages enterprise-wide WAF rules.

Performance Considerations

AWS WAF is designed to operate with minimal latency. Its rule engine evaluates requests efficiently using a deterministic processing model. CloudFront distribution with AWS WAF ensures edge-level filtering before requests reach the backend.

Benefits of Using AWS WAF

  • Fully managed and scalable
  • Automatic updates with AWS managed rules
  • Low latency processing
  • Tightly integrated with AWS edge and compute services
  • Flexible rule customization
  • No maintenance required
  • Real-time monitoring

Limitations of AWS WAF

  • No Layer 3/4 protections (requires AWS Shield)
  • Custom regex rules may affect performance
  • Advanced rule sets may increase cost
  • Complex rule design requires expertise

Pricing Overview

AWS WAF pricing is based on:

  • Web ACL count
  • Rules per web ACL
  • Request volume inspected

There are no upfront commitments; pay-as-you-go pricing ensures flexibility.

Best Practices for AWS WAF

  • Start with AWS Managed Rules for fast protection
  • Use rate-based rules for login endpoints
  • Enable full logging for threat analysis
  • Combine WAF with CloudFront for high performance
  • Use Web ACLs per environment (prod/staging)
  • Integrate with AWS Firewall Manager for organizations
  • Regularly update rule priorities

AWS WAF is a powerful, scalable, and fully managed web application firewall that provides robust protection against threats targeting web applications and APIs. With its wide range of features, support for managed rules, seamless integration with AWS services, and flexible configuration options, AWS WAF is a critical component for organizations looking to secure their cloud environments. Whether you are protecting an e-commerce site, mobile backend API, or enterprise-level digital platform, AWS WAF offers the tools needed to mitigate threats, enforce compliance, and ensure high availability.

Related Tutorials

Frequently Asked Questions for AWS

An AWS Region is a geographical area with multiple isolated availability zones. Regions ensure high availability, fault tolerance, and data redundancy.

AWS EBS (Elastic Block Store) provides block-level storage for use with EC2 instances. It's ideal for databases and other performance-intensive applications.



  • S3: Object storage for unstructured data.
  • EBS: Block storage for structured data like databases.

  • Regions are geographic areas.
  • Availability Zones are isolated data centers within a region, providing high availability for your applications.

AWS pricing follows a pay-as-you-go model. You pay only for the resources you use, with options like on-demand instances, reserved instances, and spot instances to optimize costs.



AWS S3 (Simple Storage Service) is an object storage service used to store and retrieve any amount of data from anywhere. It's ideal for backup, data archiving, and big data analytics.



Amazon RDS (Relational Database Service) is a managed database service supporting engines like MySQL, PostgreSQL, Oracle, and SQL Server. It automates tasks like backups and updates.



  • Scalability: Resources scale based on demand.
  • Cost-efficiency: Pay-as-you-go pricing.
  • Global Reach: Availability in multiple regions.
  • Security: Advanced encryption and compliance.
  • Flexibility: Supports various workloads and integrations.

AWS Auto Scaling automatically adjusts the number of compute resources based on demand, ensuring optimal performance and cost-efficiency.

The key AWS services include:


  • EC2 (Elastic Compute Cloud) for scalable computing.
  • S3 (Simple Storage Service) for storage.
  • RDS (Relational Database Service) for databases.
  • Lambda for serverless computing.
  • CloudFront for content delivery.

AWS CLI (Command Line Interface) is a tool for managing AWS services via commands. It provides scripting capabilities for automation.

Amazon EC2 is a web service that provides resizable compute capacity in the cloud. It enables you to launch virtual servers and manage your computing resources efficiently.

AWS Snowball is a physical device used for data migration. It allows organizations to transfer large amounts of data into AWS quickly and securely.

AWS CloudWatch is a monitoring service that collects and tracks metrics, logs, and events, helping you gain insights into your AWS infrastructure and applications.



AWS (Amazon Web Services) is a comprehensive cloud computing platform provided by Amazon. It offers on-demand cloud services such as compute power, storage, databases, networking, and more.



Elastic Load Balancer (ELB) automatically distributes incoming traffic across multiple targets (e.g., EC2 instances) to ensure high availability and fault tolerance.

Amazon VPC (Virtual Private Cloud) allows you to create a secure, isolated network within the AWS cloud, enabling you to control IP ranges, subnets, and route tables.



Route 53 is a scalable DNS (Domain Name System) web service by AWS. It connects user requests to your applications hosted on AWS resources.

AWS CloudFormation is a service that enables you to manage and provision AWS resources using infrastructure as code. It automates resource deployment through JSON or YAML templates.



AWS IAM (Identity and Access Management) allows you to control access to AWS resources securely. You can define user roles, permissions, and policies to ensure security and compliance.



  • EC2: Provides virtual servers for full control of your applications.
  • Lambda: Offers serverless computing, automatically running your code in response to events without managing servers.

Elastic Beanstalk is a PaaS (Platform as a Service) offering by AWS. It simplifies deploying and managing applications by automatically handling infrastructure provisioning and scaling.



Amazon SQS (Simple Queue Service) is a fully managed message queuing service that decouples and scales distributed systems.

AWS ensures data security through encryption (both at rest and in transit), compliance with standards (e.g., ISO, SOC, GDPR), and access controls using IAM.

AWS Lambda is a serverless computing service that lets you run code in response to events without provisioning or managing servers. You pay only for the compute time consumed.



AWS Identity and Access Management controls user access and permissions securely.

A serverless compute service running code automatically in response to events.

A Virtual Private Cloud for isolated AWS network configuration and control.

Automates resource provisioning using infrastructure as code in AWS.

A monitoring tool for AWS resources and applications, providing logs and metrics.

A virtual server for running applications on AWS with scalable compute capacity.

Distributes incoming traffic across multiple targets to ensure fault tolerance.

A scalable object storage service for backups, data archiving, and big data.

EC2, S3, RDS, Lambda, VPC, IAM, CloudWatch, DynamoDB, CloudFront, and ECS.

Tracks user activity and API usage across AWS infrastructure for auditing.

A managed relational database service supporting multiple engines like MySQL, PostgreSQL, and Oracle.

An isolated data center within a region, offering high availability and fault tolerance.

A scalable Domain Name System (DNS) web service for domain management.

Simple Notification Service sends messages or notifications to subscribers or other applications.

Brings native AWS services to on-premises locations for hybrid cloud deployments.

Automatically adjusts compute capacity to maintain performance and reduce costs.

Amazon Machine Image contains configuration information to launch EC2 instances.

Elastic Block Store provides block-level storage for use with EC2 instances.

Simple Queue Service enables decoupling and message queuing between microservices.

A serverless compute engine for containers running on ECS or EKS.

Manages and groups multiple AWS accounts centrally for billing and access control.

Distributes incoming traffic across multiple EC2 instances for better performance.

A tool for visualizing, understanding, and managing AWS costs and usage over time.

line

Copyrights © 2024 letsupdateskills All rights reserved