1. Home
  2. Training Library
  3. Designing Secure solutions in AWS - Level 2

Features of AWS Network Firewall

Instructor: Jon Myer

Features of AWS Network Firewall

There are a number of features natively supported and available when implementing AWS Network Firewall.

The features that are automatically available when deploying AWS Network Firewall include High availability and automated scaling, Stateful firewall, Web filtering, IPS or Intrusion Prevention, Alert and flow logs, Central management and visibility, and rule management and customization. Plus a diverse ecosystem of partner integrations.

How about we talk about each feature to gain a better understanding of all the capabilities of AWS Network Firewall.

  • The first feature is that AWS Network Firewall is fully managed, Highly Available, and with automated scaling. AWS supports a Service Level Agreement or SLA that is committed to an uptime of 99.99%.
  • The next three features allow for more granular enforcement and policy controls, encryption and detection capabilities. They are Stateful firewall, Web Filtering, and Intrusion prevention.

    • First, stateful means that the session connection is saved or it remembers the communication that took place. This allows for more granular policy enforcement including filtering common protocols without a specific port, not just TCP and UDP traffic.

    • Move onto Web filtering, the AWS Network Firewall supports unencrypted web traffic that is either destined in or outbound. Or if using encryption the SNI or Server name indication is used for specific sites. Typically you’ll see an SNI used with a WAF or in this case AWS WAF.  For more information on AWS WAF, please see our existing course here:

Protecting Your Web Apps Against Common Exploits using AWS WAF
https://cloudacademy.com/course/protecting-web-apps-common-exploits-using-aws-waf-1883/
 

 

  • The final feature in this set is IPS or Intrusion prevention system that allows inspection of real-time network traffic at the application layer. Including protection against vulnerability exploits and brute force attacks. 
  • AWS Network Firewall wouldn’t be complete without providing a place for central management, visibility, alerts, and flow logs.

    • The AWS Network Firewall provides the flexibility of a single deployment or a centrally deployed environment to manage security policies across all your apps, VPCs, AWS Organization. Grouping rules together, aggregating views of policy compliance including automated remediation. Bringing new accounts, resources, and network components into compliance immediately.

    • What about alerts and flow logs? Alerts logs are configured for specific rules and provide data on which rule was triggered and with flow logs, it provides state information about all the traffic that passes through the firewall. All this data can be stored in Amazon S3, used with Amazon Kinesis or configure Cloudwatch alerts.
  • The next feature is Rule management and customization. AWS has started to include more open-source functionality within its services and enables customers to run Compatible rules sourced internally, from in-house development, or externally or from 3rd party vendors. 
  • With the Diverse ecosystem of partner integrations, AWS Network Firewall supports a number of managed threat intelligence feeds for customers who prefer to leverage their existing providers. Additionally, the AWS Network Firewall logs and security event info can be sent to 3rd party analytics solutions.
Difficulty
Intermediate
Duration
2h 45m
Description

This course covers the core learning objective to meet the requirements of the 'Designing secure solutions in AWS - Level 2' skill

Learning Objectives:

  • Analyze the available options to secure credentials using features of AWS Identity and Access Management (IAM)
  • Evaluate the appropriate routing mechanism to securely access AWS service endpoints or internet-based resources from an Amazon VPC
  • Evaluate the appropriate encryption options available for data in transit and when at rest across AWS services
  • Evaluate the most appropriate key management service and options based on business requirements and governance controls

 

About the Author
Students
207898
Labs
1
Courses
211
Learning Paths
163

Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.

To date, Stuart has created 150+ courses relating to Cloud reaching over 180,000 students, mostly within the AWS category and with a heavy focus on security and compliance.

Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.

He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.

In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.

Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.