This course is a guided practice use case. It invites you to investigate a cryptomining security incident by using the Security Incident Workflow process. The topics covered in this course are 300-level and require you to understand how to use various services in Amazon Web Services (AWS). You are encouraged to complete the Security Incident Response Overview course before taking this course to gain a deeper understanding of the investigation process. There are two modules in the Security Incident Response Overview course: Module 1: Define Security Incident Response and Module 2: Using AWS Services to Investigate Security Incidents.
-Â Â Â Â Â Â Â Â Â Course level: Advanced
-Â Â Â Â Â Â Â Â Â Duration: 50 minutes
Activities
This course includes interactive learning objects.
Course objectives
In this course, you will learn to:
- Verify any charges in the AWS Billing console
- Review log sources in AWS CloudTrail to determine if any resources were created
- Disable any compromised users from the AWS Identity and Access Management (IAM) console
- Remove any suspicious or unauthorized resources
- Restore the environment to a safe state
Intended audience
This course is intended for:
-Â Â Â Â Â Â Â Â Â Security engineers
-Â Â Â Â Â Â Â Â Â Security operations center (SOC) analysts, incident analysts (responders), and security operations (SecOps)
-Â Â Â Â Â Â Â Â Â Security managers and security principals
Prerequisites
We recommend that attendees of this course have completed:
-Â Â Â Â Â Â Â Â Â AWS Security Incident Response Series Overview course, which provides the foundational knowledge you will need to investigate a security incident
-Â Â Â Â Â Â Â Â Â AWS Security Fundamentals (Second Edition), which provides baseline training on how the AWS services work
Â
Course outline
Topic 1: Navigation
-Â Â Â Â Â Â Â Â Â How to Use This Course
Topic 2: Introduction
-Â Â Â Â Â Â Â Â Â Welcome
Topic 3: Cryptomining Guided Practice
-Â Â Â Â Â Â Â Â Â Cryptomining IAM Credential Introduction
-Â Â Â Â Â Â Â Â Â Part 1: Detect
-Â Â Â Â Â Â Â Â Â Part 2: Analyze
-Â Â Â Â Â Â Â Â Â Part 3: Contain
-Â Â Â Â Â Â Â Â Â Part 4: Analyze
-Â Â Â Â Â Â Â Â Â Part 5: Contain
-Â Â Â Â Â Â Â Â Â Part 6: Eradicate and Recover
-Â Â Â Â Â Â Â Â Â Summary
Topic 4: Additional Help
-Â Â Â Â Â Â Â Â Â Learn More
Topic 5: For Students
-Â Â Â Â Â Â Â Â Â Contact Us