SANS Cloud Security
SANS Cloud Security
  • Видео 405
  • Просмотров 382 371
HANDS-ON WORKSHOP | Cloud Security Forensics & Incident Response: Aviata Chapter 9
Explore real-world cloud forensics challenges with Megan Roddie-Fonseca and Terrence Williams as they demonstrate how to identify and respond to complex incidents in enterprise cloud environments.
ACCESS THE DIGITAL WORKBOOK, SLIDES, AND ORIGINAL RECORDING:
www.sans.org/webcasts/aviata-solo-flight-challenge-cloud-security-workshop-chapter-9/
Join us for an immersive hands-on workshop investigating a sophisticated attack in Google Cloud Platform. Through guided investigation using SOF-ELK, participants will analyze a compromised GenAI application deployment that leads to data exfiltration. Students will learn how organization policies affect attack paths and how to leverage cloud logging for ...
Просмотров: 2 052

Видео

HANDS-ON WORKSHOP | Cloud Security for Leaders: Aviata Chapter 8
Просмотров 19628 дней назад
Join Principal Instructor, Jason Lam and learn actionable insights and strategies to help you effectively manage and secure your cloud environments. ACCESS THE DIGITAL WORKBOOK, SLIDES, AND ORIGINAL RECORDING: www.sans.org/webcasts/aviata-solo-flight-challenge-cloud-security-workshop-chapter-8/ Migrating to and operating in the cloud is a complex process, requiring numerous critical decisions. ...
Spooky Scary Lambda Attacks | Cloud Security Webcast
Просмотров 226Месяц назад
In AWS, the Lambda function represents a new approach to crafting and deploying compute workflows. While they free us from the burdens of patching VMs, lurking in the dark are countless ways deployment and operations can go horribly wrong. This talk will dive deep into the sinister ways attackers can exploit Lambda functions, turning them into gateways for intrusion and chaos. We will expose co...
HANDS-ON WORKSHOP | API Security Flight School: Aviata Chapter 7
Просмотров 231Месяц назад
Join Dr. Johannes Ullrich and principle instructor Jason Lam, and learn essential techniques for defending your APIs against real-world threats that you can start using immediately! In this chapter, you'll learn about the vulnerabilities of APIs in modern distributed applications and gain hands-on experience with defending against common API attacks. ACCESS THE DIGITAL WORKBOOK, SLIDES, AND ORI...
Critical CSPM Vulnerability Spotted: What You Need to Know
Просмотров 262Месяц назад
Cloud vendors require extensive access to your organization's cloud environments. This includes security vendors. For example, if a security team wants to use a Cloud Security Posture Management (CSPM) tool to scan their cloud environments, the CSPM needs read access to nearly every service. They are entrusting the CSPM with their cloud data, so the CSPM needs to take great care that this acces...
SANS CloudSecNext Summit 2024 Keynote Panel
Просмотров 4932 месяца назад
SANS CloudSecNext Summit 2024 Keynote Panel Panelists: Frank Kim, Fellow, SANS Institute Eric Johnson, Senior Instructor, SANS Institute Kevin Tyers, Certified Instructor, SANS Institute Casey Essary, Deputy CISO, BILL View upcoming Summits: www.sans.org/u/DuS SANS Cloud Security Curriculum: www.sans.org/cloud-security GIAC Cloud Security Certifications: www.giac.org/focus-areas/cloud-security/...
Keep Calm and How to Deploy Safely at Billion Event Scale
Просмотров 1162 месяца назад
In today's high-scale and high-velocity complex operations, the process and culture are as important as the technology that supports it. In this talk, end-user unicorn AppsFlyer will talk about their journey to building a platform-as-a-product to achieve the velocity, predictability, and self-serve using GitOps to the massive scale their system today requires. We'll look at considerations like ...
Open Source Serverless Cloud Certificate Authority
Просмотров 2022 месяца назад
In this talk, we’ll provide details of our recently released open-source project. After a technical overview, you’ll see a hands-on live demonstration of the CA and an example mTLS use case. You’ll learn how you could use this solution for your own applications and systems, to provide a secure and cost-effective certificate authority infrastructure. SANS CloudSecNext Summit 2024 Open-source ser...
Threat Hunting with Kusto The Query Language to Uncovering the Unknown
Просмотров 3112 месяца назад
Join us for an illuminating session on leveraging Kusto, Microsoft's powerful query language, for effective threat hunting. Kusto, offers unparalleled capabilities for analyzing large volumes of data with lightning speed and precision. In this session, we'll dive into the fundamentals of Kusto and explore how it can be used to detect and investigate security threats within your organization's d...
EKS Security Safari Hunting Threats in the Wild Wild Cloud
Просмотров 1792 месяца назад
Kubernetes is spreading through the world faster than a viral dance challenge on social media. As the K8S ecosystem on the cloud gains more attention and spotlight, hackers actively seek ways to bounce between clusters and clouds, aiming for unauthorized access. Join us to delve deep into the K8S security fundamentals on AWS (EKS) and their logging system. Explore K8S TTPs, K8S to AWS attack ve...
Who Polices the Policies Privilege Escalation and Persistence with Azure Policy
Просмотров 1142 месяца назад
The Microsoft Azure threat matrix contains a mysterious and almost empty item: AZT508 - Azure Policy, which suggests this service can break bad but gives almost no details as to how. To quote Microsoft: “Azure Policy helps to enforce organizational standards and to assess compliance at-scale.“ How does this banal sounding service come to be used for attacking Azure users? This talk aims to fill...
Cloudy with a Chance of Meatballs Handling the Unexpected in Cloud Threat Detection
Просмотров 1712 месяца назад
Threat Detection is hard- it requires deep knowledge about the platform you're detecting on, knowledge of how that platform is attacked, and the technical savvy to interpret logs and write code that detects on those attacks. So what do we do in the case of cloud platforms, where the platform and the logs are constantly changing? This presentation will cover lessons learned in cloud threat detec...
From AFT to ATO, AWS native FedRAMP through Terraform
Просмотров 902 месяца назад
The process of obtaining a FedRAMP ATO in the AWS cloud, often begins with a separation of federal and commercial resources. This separation, or sometimes a move to a new AWS account, is a long and tedious process when starting from zero. We can simplify and automate this process using Terraform with AWS Control Tower via AFT. In this talk we'll look at how Terraform, AFT, and Control tower can...
Identity Crisis Tracking Adversaries in AWS
Просмотров 1382 месяца назад
Managing identities in the cloud can be a challenging task, even for seasoned cloud professionals. To be effective, cloud security practitioners must grasp how adversaries exploit this complexity to confuse defenders and evade detection. Traditional methods of tracking attackers through a single IP address are no longer sufficient-in today's cloud landscape, we must learn to trace their activit...
Provable Security Building Automated Validation of Your Cloud Security Controls
Просмотров 1452 месяца назад
How well are your security controls working in your cloud environment? Would you know if they had gaps an attacker could exploit? Could you prove it? Cloud service providers ship new features at breakneck speed. Currently, AWS has over 15,000 APIs and 16,000 permissions. At this scale, it can be difficult to define proper security controls for your organization, verify they’re working as intend...
Thinking Inside the Box Effective DevSecOps for Containers
Просмотров 1442 месяца назад
Thinking Inside the Box Effective DevSecOps for Containers
The Yin and Yang of Generative AI in Cybersecurity Opportunities and Challenges
Просмотров 1462 месяца назад
The Yin and Yang of Generative AI in Cybersecurity Opportunities and Challenges
A Needle in a Haystack How to Find a Threat Hidden in Over 6 Billion Logs Per Day
Просмотров 1362 месяца назад
A Needle in a Haystack How to Find a Threat Hidden in Over 6 Billion Logs Per Day
Keynote | Security Journey at Elastic
Просмотров 822 месяца назад
Keynote | Security Journey at Elastic
Adding functionality to the AzureRM Provider for SecOps
Просмотров 632 месяца назад
Adding functionality to the AzureRM Provider for SecOps
Unpacking the Psycho Cyber IAM Kill Chain
Просмотров 1202 месяца назад
Unpacking the Psycho Cyber IAM Kill Chain
When Cloud Encryption Matters From Another Layer of Access Control to a False Sense of Security
Просмотров 1122 месяца назад
When Cloud Encryption Matters From Another Layer of Access Control to a False Sense of Security
Exploring Identity Integrations between the Three CSPs and their Managed Kubernetes Offerings
Просмотров 762 месяца назад
Exploring Identity Integrations between the Three CSPs and their Managed Kubernetes Offerings
Best Practices for How to Manage All Your Access from the Cloud
Просмотров 5962 месяца назад
Best Practices for How to Manage All Your Access from the Cloud
HANDS-ON WORKSHOP | Making the Switch to Azure Monitor Agent: Aviata Chapter 6
Просмотров 2332 месяца назад
HANDS-ON WORKSHOP | Making the Switch to Azure Monitor Agent: Aviata Chapter 6
GENAI Security: Risks and Challenges
Просмотров 3722 месяца назад
GENAI Security: Risks and Challenges
HANDS-ON WORKSHOP | Centralizing Cross-Cloud Security Events: Aviata Chapter 5
Просмотров 1903 месяца назад
HANDS-ON WORKSHOP | Centralizing Cross-Cloud Security Events: Aviata Chapter 5
HANDS-ON WORKSHOP | Attack and Detect Kubernetes: Aviata Chapter 4
Просмотров 3153 месяца назад
HANDS-ON WORKSHOP | Attack and Detect Kubernetes: Aviata Chapter 4
HANDS-ON WORKSHOP | Transitioning to Containerization: Aviata Chapter 3
Просмотров 3135 месяцев назад
HANDS-ON WORKSHOP | Transitioning to Containerization: Aviata Chapter 3
Defending Against Path Traversal Attacks
Просмотров 2846 месяцев назад
Defending Against Path Traversal Attacks

Комментарии

  • @constancebaptist7031
    @constancebaptist7031 3 дня назад

    Bad audio.

  • @arjunmishra1004
    @arjunmishra1004 4 дня назад

    Thanks for covering up Google Cloud

  • @johndeleon6101
    @johndeleon6101 Месяц назад

    Very, very nice!

  • @GOTHAM21
    @GOTHAM21 Месяц назад

    Somebody buy her a mic.

  • @Zombiedmonkey
    @Zombiedmonkey 2 месяца назад

    🎉

  • @Z3kyTw0
    @Z3kyTw0 2 месяца назад

    Thanks for uploading this free workshop!

  • @ranjansoumyab1963
    @ranjansoumyab1963 2 месяца назад

    Other than in the Infosec webinars, podcasts or seminars;; no where I find security is a factor for consideration. Just look into any job forums or opportunity, you'll find 100 opportunities for a outdated tools admin but security is still a afterthought.

  • @SimZoneStudios
    @SimZoneStudios 3 месяца назад

    That was the most lame answer ever why you would choose sentinel. You basically just said you should only use sentinel if you are all in on the Microsoft stack and then moved on to the rest of the presentation. Sentinel is awesome even if you are not using any other Microsoft service. Down voting.

  • @MrFools123
    @MrFools123 4 месяца назад

    can't really see. the resolution is so bad.

  • @DrNeedles54
    @DrNeedles54 5 месяцев назад

    I use a tool that helps with so many points you mentioned - ArmorCode - normalizes across scanners and internal data sources like CMDB + Reprioritizes based on context of internal systems + Automates manual remediation tasks + Tailored reports to various stakeholders. Check it out!

  • @noname-vl6vy
    @noname-vl6vy 5 месяцев назад

    this is a big help but can you have a session where you filter the logs from the aws side before sending it to sentinel? is it even possible? how?

  • @TheAckdog
    @TheAckdog 6 месяцев назад

    Appreciate the workshop. Much appreciated!

  • @jimdiroffii
    @jimdiroffii 7 месяцев назад

    Thanks for the free resources! Great talk and walkthrough.

  • @TheGoodStink1
    @TheGoodStink1 7 месяцев назад

    Great content, thanks Jon!

  • @AthAthanasius
    @AthAthanasius 7 месяцев назад

    03:00 - The moment I read/heard about this video my immediate thought was "Er, just use prepared statements?", and wondered if there was going to be more than that to this video. I'll watch the rest now :) . Although I do note that in *PERL*, the last time I did that years ago, it was a bit of a pain if you had a use case where you wanted the *same* variable to be bound in more than one place in the statement. You couldn't do that and the workaround I found was to just copy the value into a temporary variable and reference *that* in the 2nd use (and so on with second temporary for a 3rd use etc).

    • @johannesullrich3297
      @johannesullrich3297 7 месяцев назад

      Good old Perl ;) Perl DBI used to "simular" prepared statements for MySQL pre 4.0.

  • @manavkumar1071
    @manavkumar1071 7 месяцев назад

    Great

  • @dmaloney1095
    @dmaloney1095 7 месяцев назад

    Studying for GCFR now

  • @ram_bam
    @ram_bam 8 месяцев назад

    Great stuff, Brandon!

  • @torinbainter5752
    @torinbainter5752 8 месяцев назад

    Thanks Serge, I'm enjoying the content!

  • @MrKaiat
    @MrKaiat 9 месяцев назад

    ah, declare -f ! That solves a mystery. Thanks Brandon!

  • @lesliefreeman1293
    @lesliefreeman1293 9 месяцев назад

    ✌️ 'Promo SM'

  • @kevinfernandes4097
    @kevinfernandes4097 10 месяцев назад

    Where can i find the repo with the files?

  • @kevinfernandes4097
    @kevinfernandes4097 10 месяцев назад

    Where can i find the manifests ?

  • @LEARN1518
    @LEARN1518 10 месяцев назад

    Thank You Brandon

  • @a.w.5097
    @a.w.5097 10 месяцев назад

    Sounds like he's in tunnel of water.

  • @SomeInfoSecDude
    @SomeInfoSecDude 10 месяцев назад

    Clearly explained and did not put me to sleep. Quite a feat for a very dry subject.

  • @B4EB4E
    @B4EB4E 10 месяцев назад

    please do you teach powershell? i really enjoyed your teaching you are a great teacher, you should do more teachings smiles

  • @bubblyboy78
    @bubblyboy78 Год назад

    So why doesn't Terraform apply catch the manually created Security Group before and after the --refresh-only?

  • @ram_bam
    @ram_bam Год назад

    Excellent presentation.

  • @Douglas_Gillette
    @Douglas_Gillette Год назад

    This conversation was great. Thank you.

  • @anthonynash8774
    @anthonynash8774 Год назад

    This was awesome!! You mentioned providing access to your slides; however, I don't see any links for accessing them... --A

  • @nightshade37
    @nightshade37 Год назад

    Thank you, this was well presented and easy to follow.

  • @BUY_YT_VIEWS_
    @BUY_YT_VIEWS_ Год назад

    when are you gonna post again?

  • @onlyfaas
    @onlyfaas Год назад

    I took SEC588 with some engineers and architects from Sketchers. A very impressive group that knows their stuff! Thanks for the interview.

  • @ram_bam
    @ram_bam Год назад

    Are there any prerequisites for this course? I have a background in web development and am interested.

    • @mwebsec
      @mwebsec 5 месяцев назад

      Understanding of OWASP Top 10 vulnerabilities

  • @IceDruid23
    @IceDruid23 Год назад

    Thank you for this presentation. Really good quality.

  • @imwhtim
    @imwhtim Год назад

    this is awesome, really need some more videos on Azure sentinel.

  • @thefrub
    @thefrub Год назад

    Thank you for uploading this! This is exactly the kind of work I hope to be doing once I graduate

  • @killandy01
    @killandy01 Год назад

    W mans

  • @CyberFiducia
    @CyberFiducia Год назад

    Maybe setting up a script on the server that will digest the tail of the log every minute or so. Then report it to the SEIM. If there are indicators then store the verbose log and kick off an alert.

  • @Mature990
    @Mature990 Год назад

    Remarkable presentation.

  • @PandoraApocalypse
    @PandoraApocalypse Год назад

    Excellent one Shaun.This just keeps getting interesting 😎

  • @chidimoses5184
    @chidimoses5184 Год назад

    blurred images. could not see any of the demo clearly.

  • @etutorshop
    @etutorshop Год назад

    The only step missing the documentation is to enable Security Hub before we can go to the summary page.

  • @security365
    @security365 Год назад

    Great presentation !

  • @KenSherman
    @KenSherman Год назад

    I find this section (⚠2:45-3:50) VERY important.😐

  • @KenSherman
    @KenSherman Год назад

    11:35-12:05 I'm glad you interpreted what recommendations or guidances are because people generally tend to not understand that. It's not law. It's a tested best practice or method to ASSIST you towards your goals successfully or with excellence.

  • @TheMightyWalk
    @TheMightyWalk Год назад

    thanks keep going we are listening

  • @kns6132
    @kns6132 Год назад

    good session and very helpful.

  • @Cyber-Marc
    @Cyber-Marc Год назад

    Interesting perspective. The notes suggest the course eventually teaches the use of terraform to secure cloud environments. Why was terraform chosen over using the native IAC services for each provider?