AWS Architecture Blog

Category: AWS WAF

How Scale to Win uses AWS WAF to block DDoS events

In this post, you’ll learn how Scale to Win configured their network topology and AWS WAF to protect against DDoS events that reached peaks of over 2 million requests per second during the 2024 US presidential election campaign season. The post details how they implemented comprehensive DDoS protection by segmenting human and machine traffic, using tiered rate limits with CAPTCHA, and preventing CAPTCHA token reuse through AWS WAF Bot Control.

From virtual machine to Kubernetes to serverless: How dacadoo saved 78% on cloud costs and automated operations

In this post, we walk you step-by-step through dacadoo’s journey of embracing managed services, highlighting their architectural decisions as we go.

Hybrid operating model for AWS WAF

Operating models for Web App Security Governance in AWS

For most organizations, protecting their high value assets is a top priority. AWS Web Application Firewall (AWS WAF) is an industry leading solution that protects web applications from the evolving threat landscape, which includes common web exploits and bots. These threats affect availability, compromise security, or can consume excessive resources. Though AWS WAF is a […]

A proxy solution to the Amazon Cognito regional endpoint

Enriching Amazon Cognito features with an Amazon API Gateway proxy

This post was co-written with Geoff Baskwill, member of the Architecture Enabling Team at Trend Micro. At Trend Micro, we use AWS technologies to build secure solutions to help our customers improve their security posture. Sep 6 2022: Amazon Cognito user pools now support native integration with AWS Web Application Firewall (WAF), with this native […]

Solution architecture for scanner and probe automation (xxx represents the numbers as defined by the use case)

Dream11: Blocking application attacks using AWS WAF at scale

As the world’s largest fantasy sports platforms with more than 120 million registered users, Dream11 runs multiple contests simultaneously while processing millions of user requests per minute. Their user-centric and data-driven teams make it a priority to ensure that the Dream11 application (app) remains protected against all kinds of threats and vulnerabilities. Introduction to AWS […]

Figure 2. Architecture pattern (high-level layout)

Use a City Planning Analogy to Visualize and Create your Cloud Architecture

If you are new to creating cloud architectures, you might find it a daunting undertaking. However, there is an approach that can help you define a cloud architecture pattern by using a similar construct. In this blog post, I will show you how to envision your cloud architecture using this structured and simplified approach. Such […]

Serverless compute with Fargate

Rate Limiting Strategies for Serverless Applications

Serverless technologies reduce the work needed to set up and maintain computing resources, provide built-in scalability, and optimize agility, performance, cost, and security. The pay-as-you-go model is particularly liberating for developers. You can fail fast, experiment more, and do it fairly cheaply. However, serverless brings its own challenges. In this blog, we’ll examine how to […]

Figure 1. RStudio/Shiny Open Source Deployment on AWS Serverless Infrastructure

Scaling RStudio/Shiny using Serverless Architecture and AWS Fargate

Data scientists use RStudio server as an Integrated Development Environment (IDE) to develop, publish, and share interactive web dashboards built on Shiny Server. Although it is possible to use virtual server infrastructure in the cloud to run R workloads, containerization offers significant operational benefits. Migrating R workloads into a serverless model in AWS, customers can […]

OLX Edge Security Architecture

Field Notes: How OLX Europe Fights Millions of Bots with AWS

September 8, 2021: Amazon Elasticsearch Service has been renamed to Amazon OpenSearch Service. See details. This post was cowritten with Daniel Loureiro, Lead Security Engineer at OLX Group Global Information Security. At OLX, infrastructure is constantly being scanned and targeted by advanced malicious botnets. These botnets either scrape the content of their websites to monetize […]