Incident Response Playbook – EC2 Cryptomining [Cheat Sheet]
You wake up tomorrow to a GuardDuty notification that there might be EC2 cryptomining activity going on in one of your AWS accounts. What’s your…
You wake up tomorrow to a GuardDuty notification that there might be EC2 cryptomining activity going on in one of your AWS accounts. What’s your…
Studying for the AWS Certified Security Specialty exam, or deploying an application or resources on AWS that need access to long-term secrets? You need to…
Alright, this one is going to take a series but listen up because it’s super important! There’s a lot to talk about when it comes…
Here’s a CloudTrail CLI cheat sheet in both downloadable image format and text format for reference. AWS CloudTrail Downloadable CLI Cheat Sheet Please note this…
How can you tell if your threat detection measures are working in AWS? Or that your security controls and incident response playbooks are effective? One…
One day I was looking at a mess of notes I’ve created and collected from years’ worth of research, learning, and experience. I couldn’t help…
Securing your AWS accounts and environments starts with implementing AWS IAM best practices. Get this right and you will have a solid security foundation. Get…
In this lab walkthrough, we’re going to take a look at how to enumerate the AWS Secrets Manager service in order to better understand how…
Our free Hands-On Labs are a great way to dip your toes into the AWS cloud security space completely risk-free. No credit card required, just…
Our live presentation on Attacking & Defending Amazon EKS sparked interesting questions and conversations regarding the biggest threats to Amazon EKS (and Kubernetes in general). A…
Please confirm you want to block this member.
You will no longer be able to:
Please allow a few minutes for this process to complete.