Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Hunting AWS Threat Actors Using Access Analyzer Policy Suggestions

fwd:cloudsec via YouTube

Overview

Learn to effectively hunt AWS threat actors in this conference talk that explores advanced threat detection techniques using Access Analyzer Policy Suggestions. Discover how to navigate the complexities of AWS security across 400+ services, 16,000 actions, and numerous attack paths while differentiating between legitimate and non-compliant usage. Explore practical methods for creating behavioral baselines using AWS Access Analyzer's 90-day activity data, enhanced with risk-level assessments for actions, toxic combinations, and unused services. Follow along with hands-on demonstrations using Jupyter notebooks to understand how to emulate threat actor TTPs and implement SIEM-agnostic hunting detections. Building upon previous research in AWS Detection Engineering, gain insights into creating principal behavior-hunting detection systems applicable to any AWS environment. The presentation covers introduction to motivation, user database hunting, differential database analysis, detection database implementation, dummy data creation, Prowler testing, cloud log analysis, and concluding insights.

Syllabus

Introduction
Motivation
User DB
Hunting User DB
Hunting Diff DB
Hunting Detection DB
Creating Dum Data
Testing Prowler
Cloud Logs
Conclusions

Taught by

fwd:cloudsec

Reviews

Start your review of Hunting AWS Threat Actors Using Access Analyzer Policy Suggestions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.