AWS WAF Managed Rules - Government Issued Malicious IP Addresses

0

Are any of the AWS WAF Managed Rules updated with respect to U.S. Government known malicious IP addresses? Specifically, in this case, The Cybersecurity and Infrastructure Security Agency (CISA - under DHS) releases alerts containing a list of IP addresses on a regular basis which they deem malicious.

So for example, does AWS monitor alerts such as the aforementioned and update the corresponding AWS WAF Managed Rules or if this is something our customers need to manage themselves?

AWS
Chris_W
已提問 4 年前檢視次數 936 次
1 個回答
0
已接受的答案

The AWS Security Automations solution (https://docs.aws.amazon.com/solutions/latest/aws-waf-security-automations/source-code.html) contains a set of protections (https://docs.aws.amazon.com/solutions/latest/aws-waf-security-automations/capabilities.html) including "Known attacker origins (IP reputation lists): "

Known attacker origins (IP reputation lists): A number of organizations maintain reputation lists of IP addresses operated by known attackers, such as spammers, malware distributors, and botnets. This solution leverages the information in these reputation lists to help you block requests from malicious IP addresses.

A look at the source code for the solution (https://github.com/awslabs/aws-waf-security-automations/blob/master/source/custom-resource/custom-resource.py) reveals that is uses the following reputation list sources

"https://www.spamhaus.org/drop/drop.txt" "https://www.spamhaus.org/drop/edrop.txt" "https://check.torproject.org/exit-addresses", "prefix": "ExitAddress " "https://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt"

Spamhouse appears to primarily focus on reputation lists built upon hosts engaged in email spamming. The torproject list appears to identify anonymous connections, entry/exit nodes of the TOR (The Onion Router) anonymization network.
Proofpoint appear to manage the emerging threats list.

More details on how that is maintained here : https://tools.emergingthreats.net/docs/ET%20Intelligence%20Rep%20List%20Tech%20Description.pdf

You could adapt the solution to grab different lists.

AWS
nigel_h
已回答 4 年前
profile picture
專家
已審閱 1 個月前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南