{"id":13215,"date":"2024-06-11T19:19:45","date_gmt":"2024-06-11T13:49:45","guid":{"rendered":"https:\/\/opstree.com\/blog\/\/?p=13215"},"modified":"2025-08-28T23:11:48","modified_gmt":"2025-08-28T17:41:48","slug":"aws-firewall-samurai-warriors","status":"publish","type":"post","link":"https:\/\/opstree.com\/blog\/2024\/06\/11\/aws-firewall-samurai-warriors\/","title":{"rendered":"AWS Firewall- Samurai Warriors"},"content":{"rendered":"\r\n<p>Samurai are powerful warriors. We also need the same power in our infrastructure to get Control over Security threats over IP or URL Redirect attacks. So let me introduce to you the AWS Managed Firewall.<\/p>\r\n\r\n\r\n\r\n<p>In MNCs, we have separate Network and Security teams &#8211; which is good by the way. They have the proper tool to block incoming or outgoing traffic. For this, they set up a firewall on their side which helps them establish a Network Control Centre.<!--more--><\/p>\r\n\r\n\r\n\r\n<p>But managing this firewall is not easy and cheap because you have to purchase a license and to maintain that you need SMEs for particular that firewall. So to overcome all these issues we now have a <a href=\"https:\/\/opstree.com\/aws-consulting-services\/\"><strong>managed service aws<\/strong><\/a>\u00a0 that is AWS Firewall.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\">So what were<strong> the current Requirements that help me go deep-dive into this?<\/strong><\/h2>\r\n\r\n\r\n\r\n<ol>\r\n<li>We need to block some Public URLs for our egress traffic.<\/li>\r\n\r\n\r\n\r\n<li>We want to do so with a managed service.<\/li>\r\n\r\n\r\n\r\n<li>It should be quite easy to implement<\/li>\r\n\r\n\r\n\r\n<li>No Hustle and Bustle is required for setting and maintaining the firewall<\/li>\r\n\r\n\r\n\r\n<li>It should be a centralized Service. Should have control over your multiple accounts. Ex- It would be treated as Single Control Network for multi Accounts<\/li>\r\n<\/ol>\r\n<p><strong>[ Are you looking: <a href=\"https:\/\/opstree.com\/aws-consulting-services\/\">AWS Solutions<\/a>]<\/strong><\/p>\r\n\r\n\r\n\r\n<p>So, to fulfill all these requirements. The first fully managed service that came to my mind is the AWS firewall.<\/p>\r\n\r\n\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14593\" style=\"width: 617px; height: 315px;\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2023\/07\/index.png?w=1024\" alt=\"\" width=\"617\" height=\"315\" \/><\/figure>\r\n\r\n\r\n\r\n<p><a href=\"https:\/\/aws.amazon.com\/blogs\/networking-and-content-delivery\/deployment-models-for-aws-network-firewall\/\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p>\r\n\r\n\r\n\r\n<p>Well, don&#8217;t be afraid this document look difficult but quite easy to implement. So let&#8217;s start.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\"><strong>Basic Requirements:<\/strong><\/h3>\r\n\r\n\r\n\r\n<ol>\r\n<li>AWS Account<\/li>\r\n\r\n\r\n\r\n<li>Basic knowledge of the Creation of VPC and Subnets and EC2 and transit Gateway<\/li>\r\n\r\n\r\n\r\n<li>Please read the first Blog <a href=\"https:\/\/opstree.com\/blog\/\/2023\/03\/28\/aws-transit-gateway-a-saviour-for-your-connections\/\">Transit Gateway Setup<\/a> on AWS<\/li>\r\n<\/ol>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\"><strong>The Diagram has some basic terms:<\/strong><\/h3>\r\n\r\n\r\n\r\n<ol>\r\n<li><strong>Hub VPC<\/strong>: It&#8217;s a VPC in which your transit gateway is residing<\/li>\r\n\r\n\r\n\r\n<li>Spoke VPC: It&#8217;s your VPC that has to be exposed to the firewall<\/li>\r\n\r\n\r\n\r\n<li><strong>Availability Zones<\/strong>: It&#8217;s your isolated location in which you have made your VPC<\/li>\r\n\r\n\r\n\r\n<li><strong>VPC<\/strong>: <a href=\"https:\/\/opstree.com\/blog\/2024\/01\/16\/demystifying-ocis-virtual-cloud-network-a-deep-dive-into-vcn-architecture\/\">Virtual Private Cloud<\/a> is like your data-center<\/li>\r\n\r\n\r\n\r\n<li><strong>Public\/Private subnet<\/strong>: Public are those which are exposed to Internet and Private are not exposed<\/li>\r\n\r\n\r\n\r\n<li>NAT\/Internet gateway: They are just like your routers which help you to connect to the outer world<\/li>\r\n<\/ol>\r\n<p><strong>[ Check Our Case Study: <a href=\"https:\/\/opstree.com\/case-study\/migrating-from-on-prem-to-aws-with-enhanced-observability-security-and-cost-optimization\/\">Migrating from On-Prem to AWS with Enhanced Observability, Security, and Cost Optimization<\/a> ]<\/strong><\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>We will do Implementation in 4 Steps:<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>First, we will set up<strong><em> Transit Gateway:<\/em><\/strong><\/p>\r\n\r\n\r\n\r\n<ol>\r\n<li>Click on Create Transit GATEWAY:<strong> Select NAME &gt; SELECT DESCRIPTION &gt; CREATE TRANSIT GATEWAY<\/strong><\/li>\r\n\r\n\r\n\r\n<li>Now CREATE two ROUTE TABLE :\r\n<ul>\r\n<li>FIREWALL-ROUTE-TABLE<\/li>\r\n\r\n\r\n\r\n<li>SPOKE-ROUTE-TABLE<\/li>\r\n<\/ul>\r\n<\/li>\r\n\r\n\r\n\r\n<li>Now Create a TGW attachment for the VPC which you want to peer<\/li>\r\n\r\n\r\n\r\n<li>If you want to peer VPC in the different account you just need to share that Transit gateway to a particular Account and create a new attachment from that account<\/li>\r\n<\/ol>\r\n\r\n\r\n\r\n<p><strong>[ Also Read: <a href=\"https:\/\/opstree.com\/blog\/2025\/04\/08\/understanding-aws-cost-and-usage-reports-cur\/\">Understanding AWS Cost and Usage Reports (CUR)<\/a> ]<\/strong><\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\"><strong>Now next setup would be configuration of your Hub\/Spoke\/Inspection VPC<\/strong><\/h3>\r\n\r\n\r\n\r\n<p class=\"has-text-align-justify\">Note: We will not discuss the creation of VPC. For VPC creation we can refer to this AWS Documentation<\/p>\r\n\r\n\r\n\r\n<p>https:\/\/docs.aws.amazon.com\/directoryservice\/latest\/admin-guide\/gsg_create_vpc.html<\/p>\r\n\r\n\r\n\r\n<h5 class=\"wp-block-heading\"><strong>Creation of Spoke VPC:<\/strong><\/h5>\r\n\r\n\r\n\r\n<p>As told earlier, Spoke VPC are those whose traffic has to be filtered through the firewall. You can use your existing VPC or create a <em>new one with tgw-subnet in each availability zone <\/em><\/p>\r\n\r\n\r\n\r\n<h5 class=\"wp-block-heading\"><strong>Now create Inspection VPC <\/strong><\/h5>\r\n\r\n\r\n\r\n<p>Inspection VPC is in which you will have your Firewall setup.<\/p>\r\n\r\n\r\n\r\n<ol>\r\n<li>Inspection VPC will be having subnet name TGW subnet<\/li>\r\n<\/ol>\r\n\r\n\r\n\r\n<h5 class=\"wp-block-heading\"><strong>Now create central Egress VPC<\/strong><\/h5>\r\n\r\n\r\n\r\n<p><em>Central Egress VPC will be forwarding your Traffic which is getting filtered from Inspection(Firewall) VPC <\/em><\/p>\r\n\r\n\r\n\r\n<ol>\r\n<li>Central Egress VPC will have TGW Subnet\/Public Subnet<\/li>\r\n\r\n\r\n\r\n<li>NAT Gateway<\/li>\r\n\r\n\r\n\r\n<li>Internet Gateway<\/li>\r\n<\/ol>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\"><strong>After setting up Transit Gateway and 3 VPCs we will be moving towards our third step, setup of Firewall<\/strong><\/h3>\r\n\r\n\r\n\r\n<p><strong>Firewall Setup is easy we will follow bottom to above approach<\/strong><\/p>\r\n\r\n\r\n\r\n<p><strong>FIREWALL RULES &#8211;&gt; FIREWALL POLICIES &#8212;-&gt; FIREWALL<\/strong><\/p>\r\n\r\n\r\n\r\n<p><em><strong>We will first setup Rules<\/strong> <\/em><\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\r\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" data-id=\"14641\" class=\"wp-image-14641\" style=\"width: 800px;\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2023\/07\/screenshot-2023-07-14-at-2.45.51-pm.png?w=1024\" alt=\"\" width=\"800\" \/><\/figure>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n\r\n\r\n<ol>\r\n<li>Go to <strong>AWS Firewall &gt; Select Firewall Rules<\/strong><\/li>\r\n\r\n\r\n\r\n<li>Choose action <strong>RULE GROUP TYPE &gt; Forward to stateful groups<\/strong><\/li>\r\n\r\n\r\n\r\n<li>Choose <strong>Stateful Group Option &gt; DOMAIN LIST<\/strong><\/li>\r\n\r\n\r\n\r\n<li>Select <strong>Stateful Rule Order &gt; Strict <\/strong><\/li>\r\n\r\n\r\n\r\n<li>Now create <strong><em>Rule Groups<\/em><\/strong><br \/>\r\n<ul>\r\n<li>Group Name:<strong> Opstree<\/strong><\/li>\r\n\r\n\r\n\r\n<li style=\"font-size: 16px;\"><span style=\"color: #000000; , monospace;font-size: 12px;\">Capacity <\/span><span style=\", monospace;font-size: 12px; color: #098658;\"><strong>10000<\/strong><\/span><\/li>\r\n\r\n\r\n\r\n<li>List the number of Domains you want to allow<\/li>\r\n\r\n\r\n\r\n<li>Choose a rule to <strong>ALLOW<\/strong><\/li>\r\n\r\n\r\n\r\n<li>Traffic to Inspect <strong>HTTP\/HTTPS<\/strong><\/li>\r\n\r\n\r\n\r\n<li>Under Source IP Types: You can also choose <strong>Source IPs <\/strong>from where you are allowing the traffic to be going through firewall Here you can enter your VPC Ranges<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ol>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\"><strong>Now Create the firewall Policy<\/strong><\/h3>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-14644\" src=\"https:\/\/opstree.com\/blog\/\/wp-content\/uploads\/2023\/07\/screenshot-2023-07-14-at-3.09.20-pm.png?w=1024\" alt=\"\" width=\"812\" height=\"477\" \/><\/figure>\r\n\r\n\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n\r\n\r\n<ol>\r\n<li>Select &gt; <strong>Firewall Policies<\/strong><\/li>\r\n\r\n\r\n\r\n<li>Choose Name &gt; <strong>Opstree Firewall<\/strong><\/li>\r\n\r\n\r\n\r\n<li>Select &gt; <strong>Select Exception policy (Drop)<\/strong><\/li>\r\n\r\n\r\n\r\n<li><strong>Select Default Actions<\/strong>\r\n<ul>\r\n<li><strong>Fragmented packets &gt; Use same actions for all packets<\/strong><\/li>\r\n\r\n\r\n\r\n<li>Action &gt; <strong>Forward to stateful rule groups<\/strong><\/li>\r\n<\/ul>\r\n<\/li>\r\n\r\n\r\n\r\n<li>In stateful rule evaluation\r\n<ul>\r\n<li>Rule order &gt; <strong>Strict<\/strong><\/li>\r\n\r\n\r\n\r\n<li>Default Action &gt; <strong>Drop established<\/strong><\/li>\r\n\r\n\r\n\r\n<li>Now Add Stateful rule group you have created before in firewall rules by the names <strong>Opstree<\/strong><\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ol>\r\n<p><strong>[ Must Read Ebook: <a href=\"https:\/\/opstree.com\/ebooks\/getting-started-with-generative-ai-on-aws\/\">Getting Started with Generative AI on AWS<\/a> ]<\/strong><\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\"><strong>Now create the BIG FISH FIREWALL<\/strong><\/h3>\r\n\r\n\r\n\r\n<ol>\r\n<li>Enter the Name &gt; Opstree-Firewall<\/li>\r\n\r\n\r\n\r\n<li>Chose your VPC &gt; Inspection VPC<\/li>\r\n\r\n\r\n\r\n<li>Choose Firewall Subnets &gt; Select all the three Subnets you have created for Firewall<\/li>\r\n\r\n\r\n\r\n<li>Associated Firewall Policy &gt; <strong>Select your existing policy <\/strong>&gt; <strong>opstree-Firewall<\/strong><\/li>\r\n\r\n\r\n\r\n<li>Enable <strong>Delete protection<\/strong> and <strong>Subnet change protection<\/strong><\/li>\r\n<\/ol>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\"><strong>Now you are all ready to block any Website on your Infrastructure <\/strong><\/h3>\r\n\r\n\r\n\r\n<p><strong>NOTE<\/strong>: Deploying Firewall in different subnet create different VPC endpoints.<\/p>\r\n\r\n\r\n\r\n<p>We will not go deep Dive into VPC endpoints. It established private endpoint to connect with any <a href=\"https:\/\/opstree.com\/aws-partner\/\"><strong>AWS service<\/strong><\/a> within that VPC.<\/p>\r\n\r\n\r\n\r\n<p><strong>So now all the 3 Steps are done Let&#8217;s move towards the final step that Adding routes of tgw-id replacing your NAT Id in your spoke VPCs <\/strong><\/p>\r\n\r\n\r\n\r\n<p>When you have created TGW in our first step you have got a <strong>tgw-id<\/strong> just replace it with the NAT id in your route table of your Spoke VPC subnets<\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\"><strong>Now the Egress traffic flow will be like this in your VPCs. <\/strong><\/h3>\r\n\r\n\r\n\r\n<ol>\r\n<li>Now traffic coming from Spoke VPC will have an entry for Transit gateway id for the traffic 0.0.0.0\/0 in the route tables<\/li>\r\n\r\n\r\n\r\n<li>Traffic will be from <strong>SPOKE to TRANSIT GATEWAY<\/strong> <strong>Spoke VPC Route table<\/strong><\/li>\r\n\r\n\r\n\r\n<li><strong>Spoke VPC Route table <\/strong>in Transit Gateway has entry to enter route coming from <strong>spoke VPC to Inspection VPC <\/strong><\/li>\r\n\r\n\r\n\r\n<li>After traffic is entered into Inspection VPC it now has an entry over the firewall endpoint<\/li>\r\n\r\n\r\n\r\n<li>The firewall Endpoint will filter the traffic according to the rules<\/li>\r\n\r\n\r\n\r\n<li>Now it will throw back traffic to TGW Firewall TGW Route table<\/li>\r\n\r\n\r\n\r\n<li>Now TGW has filtered traffic, Now it will throw traffic to Central Egress VPC<\/li>\r\n\r\n\r\n\r\n<li>Where traffic goes to the outer world. Like if you have not allowed xyz.com into your firewall rules. you will not be able to access that into your Instance from where there the traffic is being originated<\/li>\r\n<\/ol>\r\n\r\n\r\n\r\n<p><strong>The same can be created for ingress traffic also you just need to add one more VPC Central-ingress VPC<\/strong><\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\r\n\r\n\r\n\r\n<p>I hope I could shed some light on the role and importance of the managed service &#8211; <a href=\"https:\/\/opstree.com\/blog\/2024\/09\/03\/blocking-web-traffic-with-waf-in-aws\/\">AWS Firewall<\/a>. If you guys enjoyed reading this and found it insightful do share it amongst your community. Want to give any feedback or suggestions, you can reach out to me. If you have any interesting use-case for AWS Firewall, do share them in the comments section.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n<ul class=\"wp-block-social-links aligncenter is-content-justification-center is-layout-flex wp-container-core-social-links-is-layout-1 wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-linkedin  wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/opstree-solutions\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li>\r\n\r\n<li class=\"wp-social-link wp-social-link-youtube  wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.youtube.com\/channel\/UCeLma6SpNYH7jjYKSBNSexw\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M21.8,8.001c0,0-0.195-1.378-0.795-1.985c-0.76-0.797-1.613-0.801-2.004-0.847c-2.799-0.202-6.997-0.202-6.997-0.202 h-0.009c0,0-4.198,0-6.997,0.202C4.608,5.216,3.756,5.22,2.995,6.016C2.395,6.623,2.2,8.001,2.2,8.001S2,9.62,2,11.238v1.517 c0,1.618,0.2,3.237,0.2,3.237s0.195,1.378,0.795,1.985c0.761,0.797,1.76,0.771,2.205,0.855c1.6,0.153,6.8,0.201,6.8,0.201 s4.203-0.006,7.001-0.209c0.391-0.047,1.243-0.051,2.004-0.847c0.6-0.607,0.795-1.985,0.795-1.985s0.2-1.618,0.2-3.237v-1.517 C22,9.62,21.8,8.001,21.8,8.001z M9.935,14.594l-0.001-5.62l5.404,2.82L9.935,14.594z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">YouTube<\/span><\/a><\/li>\r\n\r\n<li class=\"wp-social-link wp-social-link-github  wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/OpsTree\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12,2C6.477,2,2,6.477,2,12c0,4.419,2.865,8.166,6.839,9.489c0.5,0.09,0.682-0.218,0.682-0.484 c0-0.236-0.009-0.866-0.014-1.699c-2.782,0.602-3.369-1.34-3.369-1.34c-0.455-1.157-1.11-1.465-1.11-1.465 c-0.909-0.62,0.069-0.608,0.069-0.608c1.004,0.071,1.532,1.03,1.532,1.03c0.891,1.529,2.341,1.089,2.91,0.833 c0.091-0.647,0.349-1.086,0.635-1.337c-2.22-0.251-4.555-1.111-4.555-4.943c0-1.091,0.39-1.984,1.03-2.682 C6.546,8.54,6.202,7.524,6.746,6.148c0,0,0.84-0.269,2.75,1.025C10.295,6.95,11.15,6.84,12,6.836 c0.85,0.004,1.705,0.114,2.504,0.336c1.909-1.294,2.748-1.025,2.748-1.025c0.546,1.376,0.202,2.394,0.1,2.646 c0.64,0.699,1.026,1.591,1.026,2.682c0,3.841-2.337,4.687-4.565,4.935c0.359,0.307,0.679,0.917,0.679,1.852 c0,1.335-0.012,2.415-0.012,2.741c0,0.269,0.18,0.579,0.688,0.481C19.138,20.161,22,16.416,22,12C22,6.477,17.523,2,12,2z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">GitHub<\/span><\/a><\/li>\r\n\r\n<li class=\"wp-social-link wp-social-link-facebook  wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.facebook.com\/opstree\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Facebook<\/span><\/a><\/li>\r\n\r\n<li class=\"wp-social-link wp-social-link-medium  wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/medium.com\/buildpiper\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M20.962,7.257l-5.457,8.867l-3.923-6.375l3.126-5.08c0.112-0.182,0.319-0.286,0.527-0.286c0.05,0,0.1,0.008,0.149,0.02 c0.039,0.01,0.078,0.023,0.114,0.041l5.43,2.715l0.006,0.003c0.004,0.002,0.007,0.006,0.011,0.008 C20.971,7.191,20.98,7.227,20.962,7.257z M9.86,8.592v5.783l5.14,2.57L9.86,8.592z M15.772,17.331l4.231,2.115 C20.554,19.721,21,19.529,21,19.016V8.835L15.772,17.331z M8.968,7.178L3.665,4.527C3.569,4.479,3.478,4.456,3.395,4.456 C3.163,4.456,3,4.636,3,4.938v11.45c0,0.306,0.224,0.669,0.498,0.806l4.671,2.335c0.12,0.06,0.234,0.088,0.337,0.088 c0.29,0,0.494-0.225,0.494-0.602V7.231C9,7.208,8.988,7.188,8.968,7.178z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Medium<\/span><\/a><\/li>\r\n\r\n<li class=\"wp-social-link wp-social-link-twitter  wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/opstreedevops\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M22.23,5.924c-0.736,0.326-1.527,0.547-2.357,0.646c0.847-0.508,1.498-1.312,1.804-2.27 c-0.793,0.47-1.671,0.812-2.606,0.996C18.324,4.498,17.257,4,16.077,4c-2.266,0-4.103,1.837-4.103,4.103 c0,0.322,0.036,0.635,0.106,0.935C8.67,8.867,5.647,7.234,3.623,4.751C3.27,5.357,3.067,6.062,3.067,6.814 c0,1.424,0.724,2.679,1.825,3.415c-0.673-0.021-1.305-0.206-1.859-0.513c0,0.017,0,0.034,0,0.052c0,1.988,1.414,3.647,3.292,4.023 c-0.344,0.094-0.707,0.144-1.081,0.144c-0.264,0-0.521-0.026-0.772-0.074c0.522,1.63,2.038,2.816,3.833,2.85 c-1.404,1.1-3.174,1.756-5.096,1.756c-0.331,0-0.658-0.019-0.979-0.057c1.816,1.164,3.973,1.843,6.29,1.843 c7.547,0,11.675-6.252,11.675-11.675c0-0.178-0.004-0.355-0.012-0.531C20.985,7.47,21.68,6.747,22.23,5.924z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Twitter<\/span><\/a><\/li><\/ul>\r\n\r\n\r\n","protected":false},"excerpt":{"rendered":"<p>Samurai are powerful warriors. We also need the same power in our infrastructure to get Control over Security threats over IP or URL Redirect attacks. So let me introduce to you the AWS Managed Firewall. In MNCs, we have separate Network and Security teams &#8211; which is good by the way. They have the proper &hellip; <a href=\"https:\/\/opstree.com\/blog\/2024\/06\/11\/aws-firewall-samurai-warriors\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;AWS Firewall- Samurai Warriors&#8221;<\/span><\/a><\/p>\n","protected":false},"author":200627995,"featured_media":18579,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[36349927],"tags":[768739356,768739561,343865,768739407],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/opstree.com\/blog\/wp-content\/uploads\/2024\/06\/AWS-Firewall-Samurai-Warriors.png","jetpack_likes_enabled":false,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pfDBOm-3r9","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/posts\/13215"}],"collection":[{"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/users\/200627995"}],"replies":[{"embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/comments?post=13215"}],"version-history":[{"count":31,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/posts\/13215\/revisions"}],"predecessor-version":[{"id":29602,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/posts\/13215\/revisions\/29602"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/media\/18579"}],"wp:attachment":[{"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/media?parent=13215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/categories?post=13215"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/opstree.com\/blog\/wp-json\/wp\/v2\/tags?post=13215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}