sharingsunshine
asked on
What Security Software Good For Amazon Linux 2
I am on an Amazon Linux 2 AMI running Apache 2 and I need a software solution for security. I have been told mod_security isn't a good choice. So does anyone have experience with the AWS Waf? If so, what rules are you using?
Or, do you have another idea altogether?
On my previous instance I used fail2ban but I found the bots could outsmart fail2ban so hopefully someone will have a better choice.
Let me clarify my biggest problems are postfix issues, stopping ddos, bots running up and down my site stealing bandwidth, clicking on every link and having numerous disk i/o's which I have to pay for.
By the way, I am not interested in using another AMI due to the complexity of my existing AMI.
Or, do you have another idea altogether?
On my previous instance I used fail2ban but I found the bots could outsmart fail2ban so hopefully someone will have a better choice.
Let me clarify my biggest problems are postfix issues, stopping ddos, bots running up and down my site stealing bandwidth, clicking on every link and having numerous disk i/o's which I have to pay for.
By the way, I am not interested in using another AMI due to the complexity of my existing AMI.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
My sites are wordpress driven so I have decided to go with ipThemes and I copied your list of robots too. So, thanks Dr. Klahn.
ASKER
Thanks for the content for my .htaccess
A collective database of hostile IP's could be a great resource for firewalls all around the world. I believe fail2ban is still good though not foolproof. Rule to configure for past known bot still good though they can get refined with variant - but of log reviews exercise
https://www.google.com.sg/amp/s/www.booleanworld.com/blocking-bad-bots-fail2ban/amp/
May also want to check out this
https://www.experts-exchange.com/articles/26039/Going-for-effective-DDoS-mitigation-measures.html