Threat Detection Securing Your Web Application with AWS WAF and AWS Shield This is the second article in a series. If you don’t have the base architecture built and you would like to follow along, please read this article first. In this …