- Видео 405
- Просмотров 382 371
SANS Cloud Security
США
Добавлен 16 июн 2020
SANS Cloud Security focuses the deep resources of SANS on the growing threats to the cloud by providing training, certification, research, and community initiatives to help security professionals build, deploy and manage secure cloud infrastructure, platforms, and applications.
SANS Cloud Security provides intensive, immersion training designed to help you and your staff master the practical steps necessary for defending systems and applications in the cloud against the most dangerous threats. The courses are full of important and immediately useful techniques that you can put to work as soon as you return to your office.
SANS Cloud Security provides intensive, immersion training designed to help you and your staff master the practical steps necessary for defending systems and applications in the cloud against the most dangerous threats. The courses are full of important and immediately useful techniques that you can put to work as soon as you return to your office.
HANDS-ON WORKSHOP | Cloud Security Forensics & Incident Response: Aviata Chapter 9
Explore real-world cloud forensics challenges with Megan Roddie-Fonseca and Terrence Williams as they demonstrate how to identify and respond to complex incidents in enterprise cloud environments.
ACCESS THE DIGITAL WORKBOOK, SLIDES, AND ORIGINAL RECORDING:
www.sans.org/webcasts/aviata-solo-flight-challenge-cloud-security-workshop-chapter-9/
Join us for an immersive hands-on workshop investigating a sophisticated attack in Google Cloud Platform. Through guided investigation using SOF-ELK, participants will analyze a compromised GenAI application deployment that leads to data exfiltration. Students will learn how organization policies affect attack paths and how to leverage cloud logging for ...
ACCESS THE DIGITAL WORKBOOK, SLIDES, AND ORIGINAL RECORDING:
www.sans.org/webcasts/aviata-solo-flight-challenge-cloud-security-workshop-chapter-9/
Join us for an immersive hands-on workshop investigating a sophisticated attack in Google Cloud Platform. Through guided investigation using SOF-ELK, participants will analyze a compromised GenAI application deployment that leads to data exfiltration. Students will learn how organization policies affect attack paths and how to leverage cloud logging for ...
Просмотров: 2 052
Видео
HANDS-ON WORKSHOP | Cloud Security for Leaders: Aviata Chapter 8
Просмотров 19628 дней назад
Join Principal Instructor, Jason Lam and learn actionable insights and strategies to help you effectively manage and secure your cloud environments. ACCESS THE DIGITAL WORKBOOK, SLIDES, AND ORIGINAL RECORDING: www.sans.org/webcasts/aviata-solo-flight-challenge-cloud-security-workshop-chapter-8/ Migrating to and operating in the cloud is a complex process, requiring numerous critical decisions. ...
Spooky Scary Lambda Attacks | Cloud Security Webcast
Просмотров 226Месяц назад
In AWS, the Lambda function represents a new approach to crafting and deploying compute workflows. While they free us from the burdens of patching VMs, lurking in the dark are countless ways deployment and operations can go horribly wrong. This talk will dive deep into the sinister ways attackers can exploit Lambda functions, turning them into gateways for intrusion and chaos. We will expose co...
HANDS-ON WORKSHOP | API Security Flight School: Aviata Chapter 7
Просмотров 231Месяц назад
Join Dr. Johannes Ullrich and principle instructor Jason Lam, and learn essential techniques for defending your APIs against real-world threats that you can start using immediately! In this chapter, you'll learn about the vulnerabilities of APIs in modern distributed applications and gain hands-on experience with defending against common API attacks. ACCESS THE DIGITAL WORKBOOK, SLIDES, AND ORI...
Critical CSPM Vulnerability Spotted: What You Need to Know
Просмотров 262Месяц назад
Cloud vendors require extensive access to your organization's cloud environments. This includes security vendors. For example, if a security team wants to use a Cloud Security Posture Management (CSPM) tool to scan their cloud environments, the CSPM needs read access to nearly every service. They are entrusting the CSPM with their cloud data, so the CSPM needs to take great care that this acces...
SANS CloudSecNext Summit 2024 Keynote Panel
Просмотров 4932 месяца назад
SANS CloudSecNext Summit 2024 Keynote Panel Panelists: Frank Kim, Fellow, SANS Institute Eric Johnson, Senior Instructor, SANS Institute Kevin Tyers, Certified Instructor, SANS Institute Casey Essary, Deputy CISO, BILL View upcoming Summits: www.sans.org/u/DuS SANS Cloud Security Curriculum: www.sans.org/cloud-security GIAC Cloud Security Certifications: www.giac.org/focus-areas/cloud-security/...
Keep Calm and How to Deploy Safely at Billion Event Scale
Просмотров 1162 месяца назад
In today's high-scale and high-velocity complex operations, the process and culture are as important as the technology that supports it. In this talk, end-user unicorn AppsFlyer will talk about their journey to building a platform-as-a-product to achieve the velocity, predictability, and self-serve using GitOps to the massive scale their system today requires. We'll look at considerations like ...
Open Source Serverless Cloud Certificate Authority
Просмотров 2022 месяца назад
In this talk, we’ll provide details of our recently released open-source project. After a technical overview, you’ll see a hands-on live demonstration of the CA and an example mTLS use case. You’ll learn how you could use this solution for your own applications and systems, to provide a secure and cost-effective certificate authority infrastructure. SANS CloudSecNext Summit 2024 Open-source ser...
Threat Hunting with Kusto The Query Language to Uncovering the Unknown
Просмотров 3112 месяца назад
Join us for an illuminating session on leveraging Kusto, Microsoft's powerful query language, for effective threat hunting. Kusto, offers unparalleled capabilities for analyzing large volumes of data with lightning speed and precision. In this session, we'll dive into the fundamentals of Kusto and explore how it can be used to detect and investigate security threats within your organization's d...
EKS Security Safari Hunting Threats in the Wild Wild Cloud
Просмотров 1792 месяца назад
Kubernetes is spreading through the world faster than a viral dance challenge on social media. As the K8S ecosystem on the cloud gains more attention and spotlight, hackers actively seek ways to bounce between clusters and clouds, aiming for unauthorized access. Join us to delve deep into the K8S security fundamentals on AWS (EKS) and their logging system. Explore K8S TTPs, K8S to AWS attack ve...
Who Polices the Policies Privilege Escalation and Persistence with Azure Policy
Просмотров 1142 месяца назад
The Microsoft Azure threat matrix contains a mysterious and almost empty item: AZT508 - Azure Policy, which suggests this service can break bad but gives almost no details as to how. To quote Microsoft: “Azure Policy helps to enforce organizational standards and to assess compliance at-scale.“ How does this banal sounding service come to be used for attacking Azure users? This talk aims to fill...
Cloudy with a Chance of Meatballs Handling the Unexpected in Cloud Threat Detection
Просмотров 1712 месяца назад
Threat Detection is hard- it requires deep knowledge about the platform you're detecting on, knowledge of how that platform is attacked, and the technical savvy to interpret logs and write code that detects on those attacks. So what do we do in the case of cloud platforms, where the platform and the logs are constantly changing? This presentation will cover lessons learned in cloud threat detec...
From AFT to ATO, AWS native FedRAMP through Terraform
Просмотров 902 месяца назад
The process of obtaining a FedRAMP ATO in the AWS cloud, often begins with a separation of federal and commercial resources. This separation, or sometimes a move to a new AWS account, is a long and tedious process when starting from zero. We can simplify and automate this process using Terraform with AWS Control Tower via AFT. In this talk we'll look at how Terraform, AFT, and Control tower can...
Identity Crisis Tracking Adversaries in AWS
Просмотров 1382 месяца назад
Managing identities in the cloud can be a challenging task, even for seasoned cloud professionals. To be effective, cloud security practitioners must grasp how adversaries exploit this complexity to confuse defenders and evade detection. Traditional methods of tracking attackers through a single IP address are no longer sufficient-in today's cloud landscape, we must learn to trace their activit...
Provable Security Building Automated Validation of Your Cloud Security Controls
Просмотров 1452 месяца назад
How well are your security controls working in your cloud environment? Would you know if they had gaps an attacker could exploit? Could you prove it? Cloud service providers ship new features at breakneck speed. Currently, AWS has over 15,000 APIs and 16,000 permissions. At this scale, it can be difficult to define proper security controls for your organization, verify they’re working as intend...
Thinking Inside the Box Effective DevSecOps for Containers
Просмотров 1442 месяца назад
Thinking Inside the Box Effective DevSecOps for Containers
The Yin and Yang of Generative AI in Cybersecurity Opportunities and Challenges
Просмотров 1462 месяца назад
The Yin and Yang of Generative AI in Cybersecurity Opportunities and Challenges
A Needle in a Haystack How to Find a Threat Hidden in Over 6 Billion Logs Per Day
Просмотров 1362 месяца назад
A Needle in a Haystack How to Find a Threat Hidden in Over 6 Billion Logs Per Day
Keynote | Security Journey at Elastic
Просмотров 822 месяца назад
Keynote | Security Journey at Elastic
Adding functionality to the AzureRM Provider for SecOps
Просмотров 632 месяца назад
Adding functionality to the AzureRM Provider for SecOps
Unpacking the Psycho Cyber IAM Kill Chain
Просмотров 1202 месяца назад
Unpacking the Psycho Cyber IAM Kill Chain
When Cloud Encryption Matters From Another Layer of Access Control to a False Sense of Security
Просмотров 1122 месяца назад
When Cloud Encryption Matters From Another Layer of Access Control to a False Sense of Security
Exploring Identity Integrations between the Three CSPs and their Managed Kubernetes Offerings
Просмотров 762 месяца назад
Exploring Identity Integrations between the Three CSPs and their Managed Kubernetes Offerings
Best Practices for How to Manage All Your Access from the Cloud
Просмотров 5962 месяца назад
Best Practices for How to Manage All Your Access from the Cloud
HANDS-ON WORKSHOP | Making the Switch to Azure Monitor Agent: Aviata Chapter 6
Просмотров 2332 месяца назад
HANDS-ON WORKSHOP | Making the Switch to Azure Monitor Agent: Aviata Chapter 6
GENAI Security: Risks and Challenges
Просмотров 3722 месяца назад
GENAI Security: Risks and Challenges
HANDS-ON WORKSHOP | Centralizing Cross-Cloud Security Events: Aviata Chapter 5
Просмотров 1903 месяца назад
HANDS-ON WORKSHOP | Centralizing Cross-Cloud Security Events: Aviata Chapter 5
HANDS-ON WORKSHOP | Attack and Detect Kubernetes: Aviata Chapter 4
Просмотров 3153 месяца назад
HANDS-ON WORKSHOP | Attack and Detect Kubernetes: Aviata Chapter 4
HANDS-ON WORKSHOP | Transitioning to Containerization: Aviata Chapter 3
Просмотров 3135 месяцев назад
HANDS-ON WORKSHOP | Transitioning to Containerization: Aviata Chapter 3
Defending Against Path Traversal Attacks
Просмотров 2846 месяцев назад
Defending Against Path Traversal Attacks
Bad audio.
Thanks for covering up Google Cloud
You're welcome!
Very, very nice!
Somebody buy her a mic.
🎉
Thanks for uploading this free workshop!
Other than in the Infosec webinars, podcasts or seminars;; no where I find security is a factor for consideration. Just look into any job forums or opportunity, you'll find 100 opportunities for a outdated tools admin but security is still a afterthought.
That was the most lame answer ever why you would choose sentinel. You basically just said you should only use sentinel if you are all in on the Microsoft stack and then moved on to the rest of the presentation. Sentinel is awesome even if you are not using any other Microsoft service. Down voting.
can't really see. the resolution is so bad.
I use a tool that helps with so many points you mentioned - ArmorCode - normalizes across scanners and internal data sources like CMDB + Reprioritizes based on context of internal systems + Automates manual remediation tasks + Tailored reports to various stakeholders. Check it out!
this is a big help but can you have a session where you filter the logs from the aws side before sending it to sentinel? is it even possible? how?
Appreciate the workshop. Much appreciated!
Thanks for the free resources! Great talk and walkthrough.
Great content, thanks Jon!
03:00 - The moment I read/heard about this video my immediate thought was "Er, just use prepared statements?", and wondered if there was going to be more than that to this video. I'll watch the rest now :) . Although I do note that in *PERL*, the last time I did that years ago, it was a bit of a pain if you had a use case where you wanted the *same* variable to be bound in more than one place in the statement. You couldn't do that and the workaround I found was to just copy the value into a temporary variable and reference *that* in the 2nd use (and so on with second temporary for a 3rd use etc).
Good old Perl ;) Perl DBI used to "simular" prepared statements for MySQL pre 4.0.
Great
Studying for GCFR now
Great stuff, Brandon!
Thanks Serge, I'm enjoying the content!
ah, declare -f ! That solves a mystery. Thanks Brandon!
✌️ 'Promo SM'
Where can i find the repo with the files?
Where can i find the manifests ?
Thank You Brandon
Sounds like he's in tunnel of water.
Clearly explained and did not put me to sleep. Quite a feat for a very dry subject.
please do you teach powershell? i really enjoyed your teaching you are a great teacher, you should do more teachings smiles
So why doesn't Terraform apply catch the manually created Security Group before and after the --refresh-only?
Excellent presentation.
This conversation was great. Thank you.
This was awesome!! You mentioned providing access to your slides; however, I don't see any links for accessing them... --A
Thank you, this was well presented and easy to follow.
when are you gonna post again?
I took SEC588 with some engineers and architects from Sketchers. A very impressive group that knows their stuff! Thanks for the interview.
Are there any prerequisites for this course? I have a background in web development and am interested.
Understanding of OWASP Top 10 vulnerabilities
Thank you for this presentation. Really good quality.
this is awesome, really need some more videos on Azure sentinel.
Thank you for uploading this! This is exactly the kind of work I hope to be doing once I graduate
W mans
Maybe setting up a script on the server that will digest the tail of the log every minute or so. Then report it to the SEIM. If there are indicators then store the verbose log and kick off an alert.
Remarkable presentation.
Excellent one Shaun.This just keeps getting interesting 😎
blurred images. could not see any of the demo clearly.
The only step missing the documentation is to enable Security Hub before we can go to the summary page.
Great presentation !
I find this section (⚠2:45-3:50) VERY important.😐
11:35-12:05 I'm glad you interpreted what recommendations or guidances are because people generally tend to not understand that. It's not law. It's a tested best practice or method to ASSIST you towards your goals successfully or with excellence.
thanks keep going we are listening
good session and very helpful.
Interesting perspective. The notes suggest the course eventually teaches the use of terraform to secure cloud environments. Why was terraform chosen over using the native IAC services for each provider?