5 links
tagged with all of: aws + incident-response
Click any tag below to further narrow down your results
Links
Effective cloud incident response requires proper infrastructure setup across major platforms like Microsoft Azure, AWS, and Google Cloud. Key recommendations include centralized log management, configuring alerts, and leveraging specific services for incident containment and eradication. The article emphasizes the importance of preparing these systems to streamline incident analysis and response efforts.
AWS CIRT has launched the Threat Technique Catalog for AWS, aimed at providing customers with insights into adversarial tactics and techniques observed during security investigations. This catalog, developed in collaboration with MITRE, categorizes specific threats to AWS and offers guidance on mitigation and detection to enhance customer security.
Preparing for cloud incidents requires a strategic approach to logging across major cloud providers. This article ranks essential logs for Microsoft, AWS, and Google Cloud, providing insights on their criticality for detecting and responding to security incidents, as well as real-life case studies illustrating their importance. Ensuring the right logs are enabled and retained is vital for effective incident response.
Zeta, a core banking technology provider, improved its incident response times by over 80% by implementing a unified observability solution using Amazon OpenSearch Service. The new system, known as Customer Service Navigator (CSN), enhances operational visibility across their multi-tenant architecture, enabling faster troubleshooting and compliance with regulatory requirements. Key features include real-time monitoring and streamlined data ingestion from various AWS services, significantly reducing mean time to resolution for incidents.
TraderTraitor, a DPRK-affiliated threat actor, targets AWS environments and the cryptocurrency sector primarily for financial gain, executing significant cyber heists through tactics such as supply chain compromise and credential theft. Defenses against such attacks include enabling AWS logging, enforcing multi-factor authentication, and monitoring network traffic to mitigate risks associated with their sophisticated social engineering and cloud service abuse methods.