You can use the CloudFormation template below to create the infrastructure in the same AZ with the 2 subnets, NAT Gateway, Internet Gateway, and EC2 instances.
A Key Pair is required before continuing this CloudFormation deployment. If you need help creating a Key Pair -> Create a key pair
Stack Name: workload-security-workshop
InspectionVPCCIDR: the CIDR that you want to use for the VPC. You don’t need to change it if you don’t want to change the default configuration.
KeyPair: Your KeyPair name.
MyPublicIP: Your public IP in CIDR. (e.g. 191.162.228.91/ 32) . You can grab it using a few tools or websites (https://ipinfo.io/ip). It will be used to only allow your IP to access the vulnerable application (DVWA)
ProtectedPrivateSubnetAZ: the AZ that you want to use for your Private subnet.
ProtectedPrivateSubnetCIDR: the CIDR that you want to use for the Private subnet. You don’t need to change it if you don’t want to.
ProtectedPublicSubnetAZ: the AZ that you want to use for your Public subnet.
ProtectedPublicSubnetCIDR: the AZ that you want to use for your Public subnet. You don’t need to change it if you don’t want to.
Leave fields as default and click Next, or optionally define tags to the environment if desired.
Here you get complete visibility into the server fleet status. (Optional) Even more information can be displayed by clicking columns.
Et voila, we just automated the deployment of multiple Workload Security Agents in our AWS environment 🤩 ☁️ 🤖 🚀