A collection of AWS Security controls for AWS Network Firewall. Configuration items include Firewall endpoints, Firewall Rule Policies, and Firewall Rule Groups (Stateful and Stateless) used to deploy network protections for VPC resources by enforcing traffic flows, filtering URLs, and inspecting traffic for vulnerabilities using IPS signatures

Network Firewall
AWS Network Firewall Custom Configuration Template

Configuration templates to create AWS Network Firewall related settings including Firewall endpoints, Firewall Rule Policies, and Firewall Rule Groups (Stateful and Stateless) used to deploy network protections for VPC resources by enforcing traffic flows, filtering URLs, and inspecting traffic for vulnerabilities using IPS signatures.

CloudFormationTerraformAWS CLI
AWS Network Firewall

This template creates an Amazon Network Firewall using a specified firewall policy and deploys it in a VPC with two subnets. The template also allows for adding a description and tags to the firewall.

CloudFormation
AWS Network Firewall Policy

This template creates an Amazon Firewall Policy with stateful and stateless rule groups. It allows you to specify the ARNs of the rule groups and set default actions for stateless traffic. The template also supports adding tags for easy management.

CloudFormation
AWS Network Firewall Logging Configuration with CloudWatch Logs and Kinesis Data Firehose

This template creates a logging configuration for a Network Firewall. It specifies that alert logs should be sent to an Amazon CloudWatch Logs log group and flow logs should be sent to an Amazon Kinesis Data Firehose delivery stream.

CloudFormation
AWS Network Firewall Logging Configuration with Amazon S3

This template creates a logging configuration for a Network Firewall. It specifies that flow logs should be sent to an Amazon S3 bucket.

CloudFormation
AWS Network Firewall: Stateful Rule Group

This template creates a stateful rule group for AWS Network Firewall. The rule group allows TCP traffic from a specific source IP range to a specific destination IP range on a specific port. It has a capacity of 100 and can be tagged with custom key-value pairs.

CloudFormation
AWS Network Firewall: Stateless Rule Group

This template creates a stateless rule group for AWS Network Firewall. The rule group allows traffic from any source IP address to destinations in the 10.0.0.0/8 subnet on ports 15000-30000, using protocol 6 (TCP), and allows outbound traffic on port 443 (HTTPS).

CloudFormation
Config Rule
Network Firewall Policy has Default Action for Fragment Packets

A Config rule that checks if an AWS Network Firewall policy is configured with a user defined stateless default action for fragmented packets. The rule is NON_COMPLIANT if stateless default action for fragmented packets does not match with user defined default action.

CloudFormationTerraformAWS CLI
Network Firewall Policy has Default Action for Full Packets

A Config rule that checks if an AWS Network Firewall policy is configured with a user defined default stateless action for full packets. This rule is NON_COMPLIANT if default stateless action for full packets does not match with user defined default stateless action.

CloudFormationTerraformAWS CLI
Network Firewall Policy Associated with a Rule Group

A Config rule to check AWS Network Firewall policy is associated with stateful OR stateless rule groups. This rule is NON_COMPLIANT if no stateful or stateless rule groups are associated with the Network Firewall policy else COMPLIANT if any one of the rule group exists.

CloudFormationTerraformAWS CLI
Network Firewall Stateless Rule Group is Not Empty

A Config rule that checks if a Stateless Network Firewall Rule Group contains rules. The rule is NON_COMPLIANT if there are no rules in a Stateless Network Firewall Rule Group.

CloudFormationTerraformAWS CLI
Check if Network Firewall Logging is Enabled

Checks if AWS Network Firewall firewalls have logging enabled. The rule is NON_COMPLIANT if a logging type is not configured. You can specify which logging type you want the rule to check.

CloudFormation
Check if Network Firewall is deployed across multiple Availability Zones

Checks if AWS Network Firewall firewalls are deployed across multiple Availability Zones. The rule is NON_COMPLIANT if firewalls are deployed in only one Availability Zone or in fewer zones than the number listed in the optional parameter.

CloudFormation