When mitigating against DOS/DDOS attacks, use the same practice you would use on you on-remise components
A
Firewalls: Security groups, network access control lists, host-based firewalls
Web application Firewalls(WAFS)
Host-based or inline IDS/IPS(zTrend Micro)
Traffic shaping/rate limiting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Capabilities based on its elasticity
A
you can potentially use cloudfront to absorb DOS/SSOS flooding attacks.
a potential attackers trying to attacj content behind a cloudfront distribution is likely to send most requests to cloudfront edge locations, where the AWS infrastrucure will absorb the extra requests with minimal to no impact on the back-end customer web servers.