Mitigating and Protecting Against DoS & DDoS Attacks

Information

Organizations running Internet applications recognize the risk of being the subject of Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks by competitors, activists, or individuals. Risk profiles vary depending on the nature of business, recent events, the political situation, as well as technology exposure.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

In order to effectively mitigate, contain, and generally manage your exposure to DoS/DDoS attacks, you should build a layer defense model.

See Also

https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Best_Practices.pdf

Item Details

Category: ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PROGRAM MANAGEMENT, RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AC-4, 800-53|CA-2, 800-53|CA-5, 800-53|CA-6, 800-53|CM-3, 800-53|CM-4, 800-53|CP-10, 800-53|PM-9, 800-53|RA-1, 800-53|RA-5, 800-53|SA-7, 800-53|SC-7, 800-53|SI-1, 800-53|SI-2, 800-53|SI-5

Plugin: amazon_aws

Control ID: fef65fbb15946a5fc0c9c5be5f7238c5676c7ac224a2b90ce86212ab7f0dbfca