10 followers
C☁️d Security || Cl☁️d Threat Detection 🕸️
Lifecycle Process Research the attack technique — Lab 1 Set up proper logging — Lab 2 Attack realistic assets — Lab 3 Review log data — Lab...
In this CTF, you will play the role of a Cloud Security Consultant. Your team's services have been enlisted by Huge Logistics to conduct an external...
Lab Objective View the Lambda function that will handle the event Create an AWS EventBridge rule to capture CloudTrail data events involving your...
Lab Objective Tear down evidence-app resources using destroy.sh (Optional) Reset CloudShell home directory contents Challenge 1: Teardown...
Lab Objective Discover where the CloudTrail data is being written to within the cloudlogs- S3 bucket Download just today's data to your CloudShell...
Lab Objective You will act as an attacker in the following ways to generate log data, which will help build your detection and automation: Perform...