Skip to content
This repository was archived by the owner on May 29, 2024. It is now read-only.

Commit f9cb771

Browse files
authored
Merge pull request #14 from aws-samples/ckp/update-step-0
Ckp/update step 0
2 parents ea6f8aa + 6684865 commit f9cb771

File tree

1 file changed

+9
-12
lines changed

1 file changed

+9
-12
lines changed

docs/step-0.md

Lines changed: 9 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
11
# Step 0 - Deploy the Cloudformation Stacks
22

3-
To run the lab, you will need to deploy the [WAF Security Automations Solution](https://aws.amazon.com/solutions/aws-waf-security-automations/) and a sample Web App that we'll use for testing.
3+
In this step, you will deploy two CloudFormation templates required for the workshop.
4+
5+
You will deploy the [WAF Security Automations Solution](https://aws.amazon.com/solutions/aws-waf-security-automations/) and a sample Web Application. The Sample Web Application template contains an EC2 instance containing the [OWASP Juice Shop](https://www2.owasp.org/www-project-juice-shop/). It is exposed by an Application Load Balancer. The sample Web Application will be protected by the WAF. The OWASP Juice Shop is an example web application containing many common vulnerabilities found in Web Applications.
46

57
> **Note**
68
You are responsible for the cost of the AWS services used while running these CloudFormation stacks. There is no additional cost for using them. For full details, see the pricing pages for each AWS service you will be using in these CloudFormation stacks. Prices are subject to change.
@@ -9,22 +11,17 @@ You are responsible for the cost of the AWS services used while running these Cl
911

1012
|Region|Launch Template|
1113
|------|---------------|
12-
|**US East (N. Virginia)** (us-east-1) | [![Deploy AWS WAF Security Automations Solution](deploy-to-aws.png)](https://console.aws.amazon.com/cloudformation/home?region=us-east-1#/stacks/new?stackName=AWSWAFSecurityAutomations&templateURL=https://s3.amazonaws.com/solutions-reference/aws-waf-security-automations/v2.3.0/aws-waf-security-automations.template)|
13-
|**US East (Ohio)** (us-east-2) | [![Deploy AWS WAF Security Automations Solution](deploy-to-aws.png)](https://console.aws.amazon.com/cloudformation/home?region=us-east-2#/stacks/new?stackName=AWSWAFSecurityAutomations&templateURL=https://s3.amazonaws.com/solutions-reference/aws-waf-security-automations/v2.3.0/aws-waf-security-automations.template)|
14-
|**US West (Oregon)** (us-west-2) | [![Deploy AWS WAF Security Automations Solution](deploy-to-aws.png)](https://console.aws.amazon.com/cloudformation/home?region=us-west-2#/stacks/new?stackName=AWSWAFSecurityAutomations&templateURL=https://s3.amazonaws.com/solutions-reference/aws-waf-security-automations/v2.3.0/aws-waf-security-automations.template)|
15-
|**EU (Ireland)** (eu-west-1) | [![Deploy AWS WAF Security Automations Solution](deploy-to-aws.png)](https://console.aws.amazon.com/cloudformation/home?region=eu-west-1#/stacks/new?stackName=AWSWAFSecurityAutomations&templateURL=https://s3.amazonaws.com/solutions-reference/aws-waf-security-automations/v2.3.0/aws-waf-security-automations.template)|
16-
|**EU (London)** (eu-west-2) | [![Deploy AWS WAF Security Automations Solution](deploy-to-aws.png)](https://console.aws.amazon.com/cloudformation/home?region=eu-west-2#/stacks/new?stackName=AWSWAFSecurityAutomations&templateURL=https://s3.amazonaws.com/solutions-reference/aws-waf-security-automations/v2.3.0/aws-waf-security-automations.template)|
14+
|**US East (N. Virginia)** (us-east-1) | [![Deploy AWS WAF Security Automations Solution](deploy-to-aws.png)](https://console.aws.amazon.com/cloudformation/home?region=us-east-1#/stacks/create/review?stackName=AWSWAFSecurityAutomations&templateURL=https://s3.amazonaws.com/solutions-reference/aws-waf-security-automations/v2.3.0/aws-waf-security-automations.template&param_ActivateHttpFloodProtectionParam=yes%20-%20AWS%20Lambda%20log%20parser&param_ActivateScannersProbesProtectionParam=yes%20-%20Amazon%20Athena%20log%20parser&param_EndpointType=ALB)|
15+
|**US East (Ohio)** (us-east-2) | [![Deploy AWS WAF Security Automations Solution](deploy-to-aws.png)](https://console.aws.amazon.com/cloudformation/home?region=us-east-2#/stacks/create/review?stackName=AWSWAFSecurityAutomations&templateURL=https://s3.amazonaws.com/solutions-reference/aws-waf-security-automations/v2.3.0/aws-waf-security-automations.template&param_ActivateHttpFloodProtectionParam=yes%20-%20AWS%20Lambda%20log%20parser&param_ActivateScannersProbesProtectionParam=yes%20-%20Amazon%20Athena%20log%20parser&param_EndpointType=ALB)|
16+
|**US West (Oregon)** (us-west-2) | [![Deploy AWS WAF Security Automations Solution](deploy-to-aws.png)](https://console.aws.amazon.com/cloudformation/home?region=us-west-2#/stacks/create/review?stackName=AWSWAFSecurityAutomations&templateURL=https://s3.amazonaws.com/solutions-reference/aws-waf-security-automations/v2.3.0/aws-waf-security-automations.template&param_ActivateHttpFloodProtectionParam=yes%20-%20AWS%20Lambda%20log%20parser&param_ActivateScannersProbesProtectionParam=yes%20-%20Amazon%20Athena%20log%20parser&param_EndpointType=ALB)|
17+
|**EU (Ireland)** (eu-west-1) | [![Deploy AWS WAF Security Automations Solution](deploy-to-aws.png)](https://console.aws.amazon.com/cloudformation/home?region=eu-west-1#/stacks/create/review?stackName=AWSWAFSecurityAutomations&templateURL=https://s3.amazonaws.com/solutions-reference/aws-waf-security-automations/v2.3.0/aws-waf-security-automations.template&param_ActivateHttpFloodProtectionParam=yes%20-%20AWS%20Lambda%20log%20parser&param_ActivateScannersProbesProtectionParam=yes%20-%20Amazon%20Athena%20log%20parser&param_EndpointType=ALB)|
18+
|**EU (London)** (eu-west-2) | [![Deploy AWS WAF Security Automations Solution](deploy-to-aws.png)](https://console.aws.amazon.com/cloudformation/home?region=eu-west-2#/stacks/create/review?stackName=AWSWAFSecurityAutomations&templateURL=https://s3.amazonaws.com/solutions-reference/aws-waf-security-automations/v2.3.0/aws-waf-security-automations.template&param_ActivateHttpFloodProtectionParam=yes%20-%20AWS%20Lambda%20log%20parser&param_ActivateScannersProbesProtectionParam=yes%20-%20Amazon%20Athena%20log%20parser&param_EndpointType=ALB)|
1719

1820
Step by step instructions:
19-
* Provide your stack with a unique name. *Note: Be careful not to exceed the 64-character stack name limit*
2021
* Provide the following template parameters:
21-
* **Activate HTTP Flood Protection** = "yes - AWS Lambda log parser"
22-
* **Activate Scanner & Probe Protection** = "yes - Amazon Athena log parser"
23-
* **Endpoint Type** = "ALB"
2422
* **Application Access Log Bucket Name** (must be all lower case to match regex) = `<enter a random bucket name here>`
2523
* Leave all other parameters set to their default values.
26-
* Continue through the remaining pages using the default values.
27-
* On the final page, check the box at the bottom allowing AWS CloudFormation to create IAM resources with custom names.
24+
* Check the box at the bottom allowing AWS CloudFormation to create IAM resources with custom names.
2825
* Click the orange "Create stack" button at the bottom-right of the page to deploy the stack into your account.
2926

3027
## Deploy the sample Web App

0 commit comments

Comments
 (0)