In this post, I’ll walk through how I deployed a static website using Amazon S3 and distributed it globally with CloudFront. Then, I applied security hardening using AWS Web ACL to defend against common threats.
Step 1: Build the Static Site
I created a simple HTML and CSS layout:
index.html
CloudFront Static Site
body {
background-color: #0e0e0e;
color: #f4f4f4;
font-family: sans-serif;
display: flex;
justify-content: center;
align-items: center;
height: 100vh;
margin: 0;
}
.container {
text-align: center;
}
Hello, CloudFront!
This site is served from an S3 bucket and distributed globally with AWS CloudFront.
Enter fullscreen mode
Exit fullscreen mode
style.css
body {
background-color: #0e0e0e;
color: #f4f4f4;
font-family: sans-serif;
display: flex;
justify-content: center;
align-items: center;
height: 100vh;
margin: 0;
}
.container {
text-align: center;
}
Enter fullscreen mode
Exit fullscreen mode
I then uploaded both files to a new S3 bucket named:javier-static-site-2025Step 2: Enable Static Website Hosting on S3
In the S3 bucket settings, I enabled static website hosting:Selected “Host a static website”Entered index.html as the index documentLeft the error document blankStep 3: Configure Bucket Policy for Public Read Access
To allow CloudFront (and users) to access the files, I added a bucket policy:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "PublicRead",
"Effect": "Allow",
"Principal": "*",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::javier-static-site-2025/*"
}
]
}
Enter fullscreen mode
Exit fullscreen mode
Step 4: Preview the Website on S3
After applying the policy, I accessed the site directly via the S3 static hosting endpoint:http://javier-static-site-2025.s3-website-ap-southeast-2.amazonaws.comThe site loaded correctly, showing the custom “Hello, CloudFront!” message.Step 5: Set Up a CloudFront Distribution
I created a CloudFront distribution to globally accelerate and cache content:Origin Domain: S3 website endpoint (not the default bucket domain)Origin Access: Public (since I allowed public access in the S3 bucket policy)Viewer Protocol Policy: Redirect HTTP to HTTPSAllowed Methods: GET, HEAD (default)Compression: EnabledStep 6: Link CloudFront to Web ACL (WAF)
I created a Web ACL named CloudFrontWebACL and associated it with the CloudFront distribution.
Adding AWS WAF Rules
With the Web ACL CloudFrontWebACL created and associated with my CloudFront distribution, I added several rules to strengthen the site’s security posture.Managed Rule Sets Added
AWSManagedRulesCommonRuleSet
Covers a wide range of common threats like LFI, bad bots, size restrictions, and more.
AWSManagedRulesAmazonIpReputationList
Blocks traffic from known malicious IPs.
AWSManagedRulesSQLiRuleSet
Specifically targets SQL injection attempts.
Custom Rate Limiting Rule – LimitRequestsByIP
Blocks any IP that makes more than 10 requests in a 5-minute window.
For all managed rules, I set the action override to “Block” to ensure they actively drop malicious traffic rather than just counting matches.Testing the Web ACLThis is the part where studying for the eJPT certification came in handy. To validate the effectiveness of each rule, I ran several tests using curl.1. Rate Limiting
for i in {1..25}; do
curl -s -o /dev/null "https://" &
done
wait
Enter fullscreen mode
Exit fullscreen mode
Result:
Requests beyond the 10-request threshold were blocked as expected. I confirmed this via the WAF metrics panel in CloudWatch, which showed exactly 25 blocked requests.2. SQL Injection Attemptcurl "https:///?id=1%27%3B%20DROP%20TABLE%20users--"Result:
The request was blocked with a 403 error, showing that the SQLiRuleSet triggered correctly.3. SQLMap User-Agent Fingerprint
curl -A "sqlmap/1.0" https://
Enter fullscreen mode
Exit fullscreen mode
Result:
Blocked with a 403 error. This confirmed that malicious User-Agent headers were being filtered properly by the common rule set.4. Path-Based Reconcurl https:///adminResult:
Returned a 404 error from S3 (object not found), but was not blocked by WAF. This is expected — WAF only triggers on known threat patterns, not missing pages.CloudWatch Logs Verification
To confirm that the WAF rules were actively blocking traffic, I reviewed the metrics and charts under the “WAF > Web ACLs > CloudFrontWebACL” section.The rate limiting rule showed 25 blocked requests at the exact timestamp of my curl loop test.SQLi and User-Agent tests were also reflected in blocked request counts under the relevant rules.
Final Thoughts
This project helped me understand how to:
Deploy a static site via S3 and accelerate it globally with CloudFront
Configure bucket permissions and static hosting
Set up and customize AWS WAF rules
Simulate attacks and observe real-time block metrics in CloudWatch
The final result is a minimal, fast, and well-protected static site — an ideal foundation for future personal projects.