You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+15-11Lines changed: 15 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,16 @@ All notable changes to this project will be documented in this file.
4
4
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
5
5
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
6
6
7
+
## [4.0.6] - 2024-12-17
8
+
9
+
### Changed
10
+
11
+
- Update the lambda to python 3.12
12
+
13
+
### Fixed
14
+
15
+
- Added a check for payload for logging before sanitizing and logging [Github issue 274](https://github.com/aws-solutions/aws-waf-security-automations/issues/274)
16
+
7
17
## [4.0.5] - 2024-10-24
8
18
9
19
### Changed
@@ -15,13 +25,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
15
25
## [4.0.4] - 2024-09-23
16
26
17
27
### Fixed
18
-
- Patched dependency version of `requests` to `2.32.3` to mitigate [CVE-2024-3651](https://nvd.nist.gov/vuln/detail/CVE-2024-3651)
19
-
- Pinned all dependencies to specific versions for reproducable builds and enable security scanning
20
-
- Allow to install latest version of `urllib3` as transitive dependency
21
28
22
-
## [4.0.4] - 2024-09-23
23
-
24
-
### Fixed
25
29
- Patched dependency version of `requests` to `2.32.3` to mitigate [CVE-2024-3651](https://nvd.nist.gov/vuln/detail/CVE-2024-3651)
26
30
- Pinned all dependencies to specific versions for reproducable builds and enable security scanning
27
31
- Allow to install latest version of `urllib3` as transitive dependency
@@ -53,7 +57,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
53
57
- Added support for 10 new AWS Managed Rules rule groups (AMR)
54
58
- Added support for country and URI configurations in HTTP Flood Athena log parser
55
59
- Added support for user-defined S3 prefix for application access log bucket
56
-
- Added support for CloudWatch log retention period configuration
60
+
- Added support for CloudWatch log retention period configuration
57
61
- Added support for multiple solution deployments in the same account and region
58
62
- Added support for exporting CloudFormation stack output values
59
63
- Replaced the hard coded amazonaws.com with {AWS::URLSuffix} in BadBotHoneypot API endpoint
@@ -94,9 +98,9 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
94
98
### Added
95
99
96
100
- Added support for configuring oversize handling for requests components
97
-
- Added support for configuring sensitivity level for SQL injection rule
101
+
- Added support for configuring sensitivity level for SQL injection rule
98
102
99
-
## [3.2] - 2021-09-22
103
+
## [3.2.0] - 2021-09-22
100
104
101
105
### Added
102
106
@@ -106,15 +110,15 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
106
110
107
111
- Bug fixes
108
112
109
-
## [3.1] - 2020-10-22
113
+
## [3.1.0] - 2020-10-22
110
114
111
115
### Changed
112
116
113
117
- Replaced s3 path-style with virtual-hosted style
Copy file name to clipboardExpand all lines: README.md
+13-18Lines changed: 13 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@
14
14
-[File Structure](#file-structure)
15
15
-[License](#license)
16
16
17
-
<aname="solution-overview"></a>
17
+
---
18
18
19
19
# Solution overview
20
20
@@ -26,14 +26,11 @@ You can install this solution in your AWS accounts by launching the provided AWS
26
26
27
27
For a detailed solution implementation guide, refer to Solution Landing Page [Security Automations for AWS WAF](https://aws.amazon.com/solutions/implementations/security-automations-for-aws-waf).
28
28
29
-
<aname="architecture-diagram"></a>
29
+
---
30
30
31
31
# Architecture diagram
32
32
33
-
<palign="center">
34
-
<imgsrc="source/image/architecture_diagram.png">
35
-
<br/>
36
-
</p>
33
+

37
34
38
35
*Security Automations for AWS WAF architecture*
39
36
@@ -49,18 +46,17 @@ The components of this solution can be grouped into the following areas of prote
49
46
***IP Reputation Lists (H)** – This component is the IP Lists Parser Lambda function that checks third-party IP reputation lists hourly for new ranges to block. These lists include the Spamhaus Don’t Route Or Peer (DROP) and Extended DROP (EDROP) lists, the Proofpoint Emerging Threats IP list, and the Tor exit node list.
50
47
***Bad Bot (I)** – This component automatically sets up a honeypot, which is a security mechanism intended to lure and deflect an attempted attack.
51
48
52
-
<aname="customizing-the-solution"></a>
49
+
---
50
+
53
51
54
52
# Customizing the solution
55
53
56
-
<aname="prerequisites-for-customization"></a>
57
54
58
55
## Prerequisites for customization
59
56
60
57
-[AWS Command Line Interface](https://aws.amazon.com/cli/)
**Note:** When deploying the template for your CloudFront endpoint, you can launch it only from the `us-east-1` Region.
142
136
143
-
<aname="file-structure"></a>
137
+
---
144
138
145
139
# File structure
146
140
147
141
This project consists of microservices that facilitate the functional areas of the solution. These microservices are deployed to a serverless environment in AWS Lambda.
148
142
149
-
<pre>
143
+
```
150
144
|-deployment/ [folder containing templates and build scripts]
151
145
|-source/
152
146
|-access_handler/ [microservice for processing bad bots honeypot endpoint access. This AWS Lambda function intercepts the suspicious request and adds the source IP address to the AWS WAF block list]
@@ -158,15 +152,16 @@ This project consists of microservices that facilitate the functional areas of t
158
152
|-log_parser/ [microservice for processing access logs searching for suspicious behavior and add the corresponding source IP addresses to an AWS WAF block list]
159
153
|-reputation_lists_parser/ [microservice for processing third-party IP reputation lists and add malicious IP addresses to an AWS WAF block list]
160
154
|-timer/ [creates a sleep function for cloudformation to pace the creation of ip_sets]
161
-
</pre>
155
+
```
162
156
163
-
<aname="Collection of operational metrics"></a>
157
+
---
164
158
165
159
# Collection of operational metrics
166
160
167
161
This solution collects anonymized operational metrics to help AWS improve the quality and features of the solution. For more information, including how to disable this capability, please see the [implementation guide](https://docs.aws.amazon.com/solutions/latest/security-automations-for-aws-waf/reference.html).
0 commit comments