Overview
Syllabus
Intro
Public Cloud Security Threats
Opportunities To Detect Attacks, Data Exfiltration
Clear The Log Fog
Public Cloud Security Program
Approach
Cloud Logs by Cloud Services
Monitor Critical Events & Activities
Context Based Monitoring
Log Types, Critical Events & Attributes
Cloud Security Insights Matter
Multi-Cloud Logging Architecture - On-Premises SIEM
Multi-Cloud Logging Architecture - CSP Cloud SIEMS
Critical Attributes For Log Monitoring
AWS Network Log
Use-case: System visibility for Compute
Use-case: AWS Audit Logging
Use-case: Network visibility for Security Events
Azure Active Directory Logs
Use-case: Automated Agent Deployment
Use-case: Network & Resource visibility for Security Events
Take Away Checklist
Taught by
RSA Conference