Which solution will meet these requirements?
Modify the AWS WAF web ACL with an IP set match rule statement to deny incoming requests from the IP address range.
Add a rule to all security groups to deny the incoming requests from the IP address range.
Modify the AWS WAF web ACL with a rate-based rule statement to deny incoming requests from the IP address range.
Configure the AWS WAF web ACL with regex match conditions. Specify a pattern set to deny the incoming requests based on the match condition.
Explanations:
Using an IP set match rule in AWS WAF allows you to specify a set of IP addresses or address ranges to block. This solution directly targets the IP range identified by the security team, blocking requests from that range at the WAF level.
Security groups operate at the instance level, not the load balancer or WAF level. Modifying security groups would not address the problem at the load balancer layer where the WAF is implemented.
A rate-based rule would block IPs based on the frequency of requests, not specifically from an identified range. This solution is more useful for blocking attackers making many requests in a short time but does not meet the requirement of blocking a specific range of IPs.
Regex match conditions are used for inspecting and matching specific patterns in requests, such as headers or URIs, but are not suited for blocking IP addresses or ranges. This would not effectively address the problem of denying access from specific IP ranges.