ministryofjustice / cloud-platform

Documentation on the MoJ cloud platform
MIT License
87 stars 45 forks source link

Add Resource to AWS Shield and associate with WAF policy #6001

Open timckt opened 3 months ago

timckt commented 3 months ago

Background

Shield advanced is enabled using AWS Firewall Manager policies. This is managed in the aws-root-account Terraform code. Our both Cloud Platform and Cloud Platform Ephemeral Test AWS Account have already enabled AWS Shield but there are no resource to be protected for Cloud Platform AWS account at the moment.

We need to add the resource to AWS Shield Advanced and associate an WAF policy to these resources if applicable.

It seems only Application load balancer can be associated with AWS WAF web ACL and Automatic application layer DDoS mitigation. Its not applicate for EIP.

Image

AWS document here

Proposed user journey

Refer to #5644 comment for more detail

Approach

Which part of the user docs does this impact

Communicate changes

Questions / Assumptions

Definition of done

Reference

How to write good user stories

timckt commented 2 months ago

This ticket is blocked by the outcome of #6114.

We shall need to discuss the next action item for ingress if we would like to implement AWS Shield Advanced. Once we have solve the IP incident and have a decision on the new ingress deployment, we can visit back this ticket.

timckt commented 2 months ago

Apart from EIP and ALB, we can add AWS Shield Advanced protection for Route 53, and the working branch is here.

Reference: https://docs.aws.amazon.com/waf/latest/developerguide/ddos-event-mitigation-logic-continuous-inspection.html

Also for SNS Notifications in AWS Shield Advanced:

From above AWS document, to enable real-time notifications of potential DDoS activity, we can use a CloudWatch alarm.