Step 5: Configure AWS DRT support - AWS WAF, AWS Firewall Manager, and AWS Shield Advanced

Step 5: Configure AWS DRT support

With AWS Shield Advanced, you can engage with the AWS DDoS Response Team (DRT) if your application is unhealthy because of a possible DDoS attack.

Note

To contact the DRT, you must be subscribed to the Business Support plan or the Enterprise Support plan. If you are not subscribed to either plan, some of the options described in this section might not be visible in your account or accessible via the AWS Shield Advanced API.

You can contact the DDoS Response Team (DRT) in one of the following ways:

  • Support case – You can open a case under AWS Shield in the AWS Support Center. If your application is unhealthy, open a case using the highest severity available for your support plan and select either the Phone or Chat contact options. In the description for your case, provide as much detail as possible. Be sure to provide information about any protected resources that you think might be affected, and the current state of your end-user experience. For example, if your user experience is degraded or parts of your application are currently unavailable, provide that information.

  • Proactive engagement – With AWS Shield Advanced proactive engagement, the DRT contacts you directly if the Amazon Route 53 health check associated with your protected resource becomes unhealthy during an event that is detected by Shield Advanced. For more information about this option, see Shield Advanced proactive engagement.

Grant the DRT limited access to certain APIs and S3 buckets that you designate

AWS Shield Advanced automatically mitigates DDoS attacks against your resources. Shield Advanced detects web application layer vectors, like web request floods and low-and-slow bad bots, but does not automatically mitigate them. To mitigate web application layer vectors, you must employ AWS WAF rules or the DRT must employ the rules on your behalf.

Note

Shield Advanced detects web application layer events when you protect Amazon CloudFront distributions and Application Load Balancers. These events indicate a statistically significant deviation in traffic, compared to your application’s historical baseline. You can choose to take no action if a deviation is expected or has not affected the health of your resource.

The DRT can assist you with web application layer events if you grant limited access to your Shield Advanced and AWS WAF APIs, and access to the Amazon S3 bucket that contains your AWS WAF logs. You can revoke access at any time. The DRT engineers only access your APIs and AWS WAF logs with your authorization, limited to the scope of your support engagement.

To authorize the DRT to assist with web application layer events on your behalf

  1. In the AWS WAF console, enable AWS WAF logging for each web ACL that is attached to a Shield Advanced protected resource.

    For the DRT to view or process your AWS WAF logs, the logs must be in Amazon S3 buckets that satisfy the following requirements:

    For information about AWS WAF logging, see Logging Web ACL traffic information.

  2. In the AWS Shield console Overview page, under Configure AWS DRT support, choose Edit DRT access.

  3. For the DRT access setting, select one of the following:

    • (Option) Create a new role for the DRT to access my account – For this option, Shield creates the role and automatically configures it for use. The new role allows the DRT to access your AWS Shield Advanced and AWS WAF resources. It also trusts the service principal drt.shield.amazonaws.com, which represents the DRT.

    • (Option) Choose an existing role for the DRT to access my account – For this option, you must modify the configuration of the role in AWS Identity and Access Management (IAM) as follows:

      • Attach the managed policy AWSShieldDRTAccessPolicy to the role. The AWSShieldDRTAccessPolicy managed policy gives the DRT access to your AWS Shield Advanced and AWS WAF resources. For more information, see Attaching and Detaching IAM Policies.

      • Modify the role to trust the service principal drt.shield.amazonaws.com. This is the service principal that represents the DRT. For more information, see IAM JSON Policy Elements: Principal.

  4. For each Amazon S3 bucket where your AWS WAF logs are stored, enter the name of the bucket and choose Add Bucket. You can add up to 10 buckets.

    This grants the DRT the following permissions on the bucket: s3:GetBucketLocation, s3:GetObject, and s3:ListBucket.

  5. Choose Save.

To enable DRT proactive engagement

Shield Advanced proactive engagement allows you to engage with the DRT more quickly when the availability of your application is affected, because of a possible attack. When you have proactive engagement enabled, the DRT contacts you when a Shield Advanced event correlates to an unhealthy Route 53 health check on one or more of your protected resources.

  1. In the AWS Shield console Overview page, under Proactive engagement and contacts, in the contacts area, choose Edit.

    In the Edit contacts page, provide the contact information for the people that you want the DRT to reach out to for proactive engagement.

    Note

    If you provide more than one contact, in the Notes, indicate the circumstances under which each contact should be used. Include primary and secondary contact designations, and provide the hours of availability and time zones for each contact.

  2. Choose Save.

    The Overview page reflects the updated contact information.

  3. Choose Edit proactive engagement feature, choose Enable, and then choose Save.

    When you first enable proactive engagement, the request goes to manual review. During this time, the proactive engagement status indicates that your request is pending review. The DRT will contact you to schedule an architecture review, which includes a review of your Route 53 health check configurations. When the review is complete, the DRT completes your request to enable proactive engagement.

You can change DRT access and permissions at any time in the Overview page.

Continue to Step 6: Create a DDoS Dashboard in CloudWatch and Set CloudWatch Alarms .