How can the security engineer improve the security at the edge of the solution to defend against this type of attack?
A company has implemented AWS WAF and Amazon CloudFront for an application.The application runs on Amazon EC2 instances that are part of an AutoScaling group.The Auto Scaling group is behind an Application Load Balancer (ALB).The AWS WAF web ACL uses an AWS Managed Rules rule group and is associated with the CloudFront distribution.CloudFront receives the request from AWSWAF and the uses the ALB as the distribution’s origin.During a security review, a security engineer discovers that the infrastructure is susceptible to a large, layer 7 DDoS attack.How can the security engineer improve the security at the edge of the solution to defend against this type of attack?Read More →