Click any tag below to further narrow down your results
Links
This article outlines Sumo Logic's cloud security features for AWS, emphasizing real-time monitoring and AI-driven incident response. It invites readers to sign up for a demo and offers insights into improving security operations.
AWS DevOps Agent is a new tool that automates incident response by correlating data from various operational tools to identify root causes and recommend fixes. It helps on-call engineers manage incidents more efficiently and provides insights for long-term system improvements. The agent integrates with popular services like CloudWatch and GitHub to streamline investigations.
This article outlines how to effectively manage alerts using Amazon Managed Service for Prometheus. It covers creating and routing alerting rules, optimizing query performance, and reducing alert fatigue for teams monitoring applications on AWS. Practical examples and YAML configurations are provided for recording and alerting rules.
The author shares their experience of having their AWS account hacked, detailing how the attacker gained access, the immediate steps taken to regain control, and the lessons learned about cloud security. They emphasize the importance of proper security measures and the mindset needed to prevent such incidents.
Effective cloud incident response requires proper infrastructure setup across major platforms like Microsoft Azure, AWS, and Google Cloud. Key recommendations include centralized log management, configuring alerts, and leveraging specific services for incident containment and eradication. The article emphasizes the importance of preparing these systems to streamline incident analysis and response efforts.
AWS CIRT has launched the Threat Technique Catalog for AWS, aimed at providing customers with insights into adversarial tactics and techniques observed during security investigations. This catalog, developed in collaboration with MITRE, categorizes specific threats to AWS and offers guidance on mitigation and detection to enhance customer security.
Preparing for cloud incidents requires a strategic approach to logging across major cloud providers. This article ranks essential logs for Microsoft, AWS, and Google Cloud, providing insights on their criticality for detecting and responding to security incidents, as well as real-life case studies illustrating their importance. Ensuring the right logs are enabled and retained is vital for effective incident response.
Zeta, a core banking technology provider, improved its incident response times by over 80% by implementing a unified observability solution using Amazon OpenSearch Service. The new system, known as Customer Service Navigator (CSN), enhances operational visibility across their multi-tenant architecture, enabling faster troubleshooting and compliance with regulatory requirements. Key features include real-time monitoring and streamlined data ingestion from various AWS services, significantly reducing mean time to resolution for incidents.
TraderTraitor, a DPRK-affiliated threat actor, targets AWS environments and the cryptocurrency sector primarily for financial gain, executing significant cyber heists through tactics such as supply chain compromise and credential theft. Defenses against such attacks include enabling AWS logging, enforcing multi-factor authentication, and monitoring network traffic to mitigate risks associated with their sophisticated social engineering and cloud service abuse methods.