Cloud Option Engineer at a tech vendor with 10,001+ employees
Real User
Top 5
Dec 8, 2025
My main use case for AWS Firewall Manager is centrally managing and enforcing security policies across multiple AWS accounts. It helps me to ensure consistent WAF rules, security group policies, and Shield Advanced protections. Instead of configuring each account manually, AWS Firewall Manager lets us apply global policies from one place, improving compliance, reducing configuration errors, and speeding up security operations. For example, I used AWS Firewall Manager to enforce a mandatory WAF rule across all of our application accounts. Whenever a new account was created in our AWS Organization, AWS Firewall Manager automatically applied the same baseline WAF policy, including SQL injection and XSS protection, without any manual setup. This ensured every workload met our security standards from day one. AWS Firewall Manager also gives us clear visibility into non-compliant resources. If any account deviates from the required security group or WAF rules, it immediately flags it, so we can fix the issues quickly and maintain consistent security across the environment.
We host our applications on the AWS platform, and to secure our boundaries, we are using AWS Firewall Manager, Web Application Firewall, and AWS Shield Advanced.
The major use case for AWS Firewall Manager is to deploy firewalls in front of the products we expose to the internet in our Kubernetes clusters and AKS clusters, ensuring we block DDoS attacks and only allow specific IP addresses. The vendors which we deal with deploy products within their Kubernetes clusters, and we want to ensure that suspicious IPs and non-reputed IPs are getting blocked. We use AWS Firewall Manager to ensure the rules are centralized because it is not just one firewall we are going to use; we are going to use multiple different firewalls, and we use AWS Firewall Manager to ensure it's centrally managed.
Senior security engeneer at a media company with 1,001-5,000 employees
Real User
Top 10
Jul 9, 2024
Our primary use case involves managing cloud infrastructure and automating deployment processes. The environment comprises a hybrid cloud setup integrating both on-premises and cloud-based resources.
We primarily use it for the file transfer aspect of our operations. We establish connections with vendor sites, specifically their file transfer servers, and engage in a substantial volume of file transfers to and from these sites. Vendors also utilize various applications to connect with our internal systems, and when they need to connect to specific components of our internal applications, we use the firewall to manage and regulate these connections. Essentially, the firewall comes into play when we want to restrict access to certain parts of our internal infrastructure.
We control traffic through Firewall Manager. You can set up security access groups and create a whitelist for some servers. We connect to a VPN in the office and our cloud instances. Then we whitelist the office IP through a security access group. We connect the instances to the servers and access the rest of the machines or servers.
Technical Architect at a venture capital & private equity firm with 11-50 employees
Real User
Jun 4, 2020
I manage the AWS Cloud infrastructure for my organization and I use the Amazon firewall. We have developed a couple of portals related to the HR industry, in particular the recruitment. As part of it, we have used all of the services required to deploy a typical job portal, starting from route managers. We have DNS servers, web servers, app servers, database servers, and S3 buckets. We also perform API calls from the file services. I have managed different instances of the firewall and this solution is another layer that helps me with centralized management. We do not concern ourselves with analysis and the determination of root cause when problems occur.
Principal Security Architect at a manufacturing company with 10,001+ employees
Real User
May 14, 2020
We use the publication firewalls to manage all these rules and the group view. It's for all the GDPR rules for the publication firewalls rules. In every department each day we discuss the GDPR calls, or we'll have acquired rules. Some of the rules can be copies of the all the existing rules plus a few nuances that each has.
Presales at a tech services company with 1,001-5,000 employees
Real User
Mar 29, 2020
We are currently developing a UI and a set of tools for users to be able to easily configure their AWS firewall. The AWS Firewall Manager is one of the solutions that were are working with for this. For industries such as banking and finance, there are regulatory requirements and compliance policies that companies have to pass. For example, if it is an application that requires the transfer of money then specific compliance would be in place. The AWS Firewall Manager makes it easy to configure and select the type of security required for the industry.
AWS Firewall Manager is a security management service which allows you to centrally configure and manage firewall rules across your accounts and applications in AWS Organization. As new applications are created, Firewall Manager makes it easy to bring new applications and resources into compliance by enforcing a common set of security rules. Now you have a single service to build firewall rules, create security policies, and enforce them in a consistent, hierarchical manner across your...
My main use case for AWS Firewall Manager is centrally managing and enforcing security policies across multiple AWS accounts. It helps me to ensure consistent WAF rules, security group policies, and Shield Advanced protections. Instead of configuring each account manually, AWS Firewall Manager lets us apply global policies from one place, improving compliance, reducing configuration errors, and speeding up security operations. For example, I used AWS Firewall Manager to enforce a mandatory WAF rule across all of our application accounts. Whenever a new account was created in our AWS Organization, AWS Firewall Manager automatically applied the same baseline WAF policy, including SQL injection and XSS protection, without any manual setup. This ensured every workload met our security standards from day one. AWS Firewall Manager also gives us clear visibility into non-compliant resources. If any account deviates from the required security group or WAF rules, it immediately flags it, so we can fix the issues quickly and maintain consistent security across the environment.
We host our applications on the AWS platform, and to secure our boundaries, we are using AWS Firewall Manager, Web Application Firewall, and AWS Shield Advanced.
The major use case for AWS Firewall Manager is to deploy firewalls in front of the products we expose to the internet in our Kubernetes clusters and AKS clusters, ensuring we block DDoS attacks and only allow specific IP addresses. The vendors which we deal with deploy products within their Kubernetes clusters, and we want to ensure that suspicious IPs and non-reputed IPs are getting blocked. We use AWS Firewall Manager to ensure the rules are centralized because it is not just one firewall we are going to use; we are going to use multiple different firewalls, and we use AWS Firewall Manager to ensure it's centrally managed.
I use AWS Firewall Manager primarily for cybersecurity solutions, particularly for AWS Firewall Manager.
Our primary use case involves managing cloud infrastructure and automating deployment processes. The environment comprises a hybrid cloud setup integrating both on-premises and cloud-based resources.
We use the product to block IPs and portals generating unusual server traffic.
We primarily use it for the file transfer aspect of our operations. We establish connections with vendor sites, specifically their file transfer servers, and engage in a substantial volume of file transfers to and from these sites. Vendors also utilize various applications to connect with our internal systems, and when they need to connect to specific components of our internal applications, we use the firewall to manage and regulate these connections. Essentially, the firewall comes into play when we want to restrict access to certain parts of our internal infrastructure.
We control traffic through Firewall Manager. You can set up security access groups and create a whitelist for some servers. We connect to a VPN in the office and our cloud instances. Then we whitelist the office IP through a security access group. We connect the instances to the servers and access the rest of the machines or servers.
I manage the AWS Cloud infrastructure for my organization and I use the Amazon firewall. We have developed a couple of portals related to the HR industry, in particular the recruitment. As part of it, we have used all of the services required to deploy a typical job portal, starting from route managers. We have DNS servers, web servers, app servers, database servers, and S3 buckets. We also perform API calls from the file services. I have managed different instances of the firewall and this solution is another layer that helps me with centralized management. We do not concern ourselves with analysis and the determination of root cause when problems occur.
We use the publication firewalls to manage all these rules and the group view. It's for all the GDPR rules for the publication firewalls rules. In every department each day we discuss the GDPR calls, or we'll have acquired rules. Some of the rules can be copies of the all the existing rules plus a few nuances that each has.
We are currently developing a UI and a set of tools for users to be able to easily configure their AWS firewall. The AWS Firewall Manager is one of the solutions that were are working with for this. For industries such as banking and finance, there are regulatory requirements and compliance policies that companies have to pass. For example, if it is an application that requires the transfer of money then specific compliance would be in place. The AWS Firewall Manager makes it easy to configure and select the type of security required for the industry.