C☁️d Security || Cl☁️d Threat Detection 🕸️
Research the attack technique — Lab 1
Set up proper logging — Lab 2
Attack realistic assets — Lab 3
Review log data — Lab...
In this CTF, you will play the role of a Cloud Security Consultant. Your team's services have been enlisted by Huge Logistics to conduct an external...
View the Lambda function that will handle the event
Create an AWS EventBridge rule to capture CloudTrail data events involving your...
Tear down evidence-app resources using destroy.sh
(Optional) Reset CloudShell home directory contents
Challenge 1: Teardown...
Discover where the CloudTrail data is being written to within the cloudlogs- S3 bucket
Download just today's data to your CloudShell...
You will act as an attacker in the following ways to generate log data, which will help build your detection and automation: