Explore a 25-minute Black Hat conference talk on leveraging AWS honey tokens for large-scale breach detection. Learn how attackers view discovered AWS access keys as potential jackpots for controlling cloud infrastructure or gathering valuable information. Discover strategies to implement and manage honey tokens effectively, enhancing your ability to detect and respond to security breaches in AWS environments. Gain insights from security experts Dan Bourke and Daniel Grzelak on protecting your cloud assets and improving overall security posture.
Overview
Syllabus
Breach Detection At Scale With AWS Honey Tokens
Taught by
Black Hat