Amazon active threat defense for Amazon Network Firewall
The active threat defense managed rule group provides advanced network threat protection
for your Network Firewall firewall policies. Amazon continuously updates these rules based on Amazon threat intelligence to protect
against active threats and cloud-specific attack patterns. While complementing existing
Amazon managed rule groups, active threat defense specifically uses Amazon threat intelligence from
MadPot, an internal Amazon threat intelligence and disruption service.
For more information about MadPot, see
Meet MadPot, a threat intelligence tool Amazon uses to protect customers from cybercrime
Amazon Network Firewall currently supports the AttackInfrastructure
active threat defense rule group.
Each rule group name in the table below is appended by either StrictOrder
or ActionOrder
.
A firewall policy's rule evaluation order determines whether you can add StrictOrder
or ActionOrder
managed rule groups to the policy.
For example, you can only add a rule group appended with StrictOrder
if the policy uses strict order for its rule evaluation order.
Note
In the console, Network Firewall automatically filters the managed rule groups available for you to add to your policy. For information about rule evaluation order, see Managing evaluation order for Suricata compatible rules in Amazon Network Firewall.
Rule group name | Maximum rule capacity per rule group | Description |
---|---|---|
|
15,000 |
Protects against threat activity by blocking communication with known harmful infrastructure tracked by Amazon. This includes:
Implements comprehensive filtering of both inbound and outbound traffic for multiple protocols, including TCP, TLS, HTTP, and outbound UDP. Uses verified threat indicators to ensure high accuracy and minimize false positives. Amazon automatically removes threat indicators when there is no evidence of related threat activity. |
Important
Network Firewall active threat defense managed rule groups have rule capacity limits that differ from the rule capacity limits that apply to other rule groups.
Get started with active threat defense
To start using the active threat defense, complete the following tasks:
-
Add the
AttackInfrastructure
rule group to your firewall policy. For instructions, see Working with Amazon managed rule groups in the Network Firewall console.Tip
After you add the rule group to your policy, you don't need to take any action to receive updates. Amazon automatically updates the rules based on the latest threat intelligence.
-
Configure your firewall policy to use either strict order or action order evaluation. This determines which version of the rule group you can add. For more information, see Managing evaluation order for Suricata compatible rules in Amazon Network Firewall.
-
Optionally monitor your firewall's activity using CloudWatch Logs. For information about monitoring Network Firewall, see Amazon Network Firewall metrics in Amazon CloudWatch.
To learn more about active threat defense managed rule groups, review the topics in this guide: