Cloud Security: Detecting and Mitigating Common Attack Techniques in Azure and AWS
Red Canary via YouTube
Overview
Join a comprehensive webinar that delves into adversarial tactics used to compromise Azure and Amazon Web Services (AWS) cloud systems. Learn from cloud security experts as they construct a hypothetical scenario demonstrating how attackers gain initial access, elevate privileges, maintain persistence, and execute other malicious activities in cloud environments. Gain practical insights into implementing effective observability measures, expanding detection coverage, responding to threats, mitigating risks, and testing security controls. Master key techniques including Cloud Accounts (T1078.004), Additional Cloud Credentials (T1098.001), and Cloud API (T1059.009). Understand the nuances of device code phishing, discover how cloud-based privilege escalation differs from endpoint-based attacks, and explore additional advanced cloud security concepts. Access supplementary resources for enhancing AWS visibility and improving overall cloud security posture through detailed guidance and expert recommendations.
Syllabus
The Detection Series: Prevalent cloud techniques
Taught by
Red Canary