- Видео 14
- Просмотров 34 400
CloudwithJerry
Австралия
Добавлен 17 апр 2008
This channel aims to make cloud operation and security more approachable to developers, architects, analyst, and pretty much everyone using the cloud.
You will learn cloud security services from Amazon Web Services (AWS), and see the live demo to understand those use cases.
Happy Learning! :)
You will learn cloud security services from Amazon Web Services (AWS), and see the live demo to understand those use cases.
Happy Learning! :)
Threat Model with GenAI
This video introduces a solution to help you automatically generate a threat model for your application in minutes rather than hours, helping you uplift your application security posture.
Github repo:
github.com/build-on-aws/threat-model-accelerator-with-genai?tab=readme-ov-file
AWS Community Post:
community.aws/content/2nEM8sepo2qQXXH1cVJYnt4rpiK/accelerate-your-threat-modeling-with-genai
Github repo:
github.com/build-on-aws/threat-model-accelerator-with-genai?tab=readme-ov-file
AWS Community Post:
community.aws/content/2nEM8sepo2qQXXH1cVJYnt4rpiK/accelerate-your-threat-modeling-with-genai
Просмотров: 111
Видео
Brief introduction of AWS IAM best practices & quick demo
Просмотров 1543 месяца назад
This video highlights some key concepts of AWS IAM, including the policy structures, grant & deny, and conditions, with a Demo of using IAM Access Analyzer to help you automatically generate required policy for your Lambda function based on the CloudTrail logs, and also to help you narrow down the permissions with insights of unused permissions.
Live Demo: How to secure your APIs on AWS
Просмотров 555Год назад
Focusing on API security on AWS this video walks you through a live demo to showcase how you can use AWS native services like CloudFront, WAF, Cognitoto secure your APIs hosted on API Gateway. If you wanted to learn the approaches to secure your APIs, you can watch the part 1 of this video as below. ruclips.net/video/Jppm-b-fNpk/видео.html Happy learning! :)
How to secure your APIs on AWS
Просмотров 762Год назад
To understand how to secure APIs on AWS, this video started from exploring OWASP API security challenges, then introducing AWS Well-Architected with relevant security best practices to address these challenges. You will learn how to use AWS services (e.g. Cognito, CloudWatch, CloudTrail, AWS Config, CloudFront, WAF, Route53, etc) through the white boarding to set up a comprehensive security fou...
Use Amazon Macie with AWS Security Hub to protect your data on S3 buckets
Просмотров 781Год назад
This video demonstrates a live demo to showcase how you can use Amazon Macie alongside AWS Security Hub to identify and visualise potential risks agains your S3 buckets. So you will learn how to configure the Macie service custom identifiers for data loss protection use case.
Use Amazon Macie to protect your data on S3 buckets
Просмотров 659Год назад
This video demonstrates a live demo to showcase how you can use Amazon Macie to protect your data on S3 buckets, including activating Macie service, refining the scope, selecting data identifiers, etc. So you will learn how to configure the Macie service for data loss protection use case.
Use Athena to Query AWS Cloudtrail Logs
Просмотров 4 тыс.Год назад
This video uses Athena to query AWS Cloudtrail logs. This is to compare the query accuracy from the previous video, which uses ChatGPT to generate the Athena SQL queries. This video helps you understand general process of checking cloudtrail logs through Athena for security incident response.
Use ChatGPT and Athena to Query AWS Cloudtrail Logs
Просмотров 757Год назад
This video tests using ChatGPT to generate prescriptive instructions to query AWS Cloudtrail logs through Athena. We pretends to be a beginner of security analyst to ask questions to ChatGPT, trying to validate if it's sufficient to guide us through the process, from setting up the investigation environment between Athena and Cloudtrail, all the way to generating Athena query command to query t...
How to use ChatGPT to generate Lambda Function and IAM Policy
Просмотров 232Год назад
This video showcases how to create Lambda Function and IAM Policy by ChatGPT through a real-world AWS operation scenario, and test the code to retrieve AWS Health status.
Amazon GuardDuty Overview and Quick Demo - Part 3 - IAM Role Credential Threat Detection
Просмотров 811Год назад
In this video I will be sharing with you what is Amazon GuardDuty, and walk through the process of IAM Role Credential threat detection from alarm triggered, security analysis, all the way to identifying the attacker, and remediate the risks.
Amazon GuardDuty Overview and Quick Demo - Part 2 - S3 Threat Detection & Remediation
Просмотров 1,6 тыс.Год назад
In this video I will be walking you through a demo from the S3 threat detection. Subscribe for more AWS Security related video in this channel: ruclips.net/channel/UCkpx26xQHQJu8i2ABxHE11w
Amazon GuardDuty Overview and Quick Demo - Part 1 - EC2 Threat Detection & Remediation
Просмотров 8 тыс.Год назад
In this video I will be sharing with you what is Amazon GuardDuty, and walk through the process of EC2 threat detection from alarm triggered, security analysis, all the way to identifying the attacker, and remediate the risks.
Amazon Security Lake Quick Demo
Просмотров 2,5 тыс.2 года назад
In this video, you will learn why security teams will need the Amazon Security Lake (New released service from AWS re:Invent 2022), and how does it help to make it easy for the security data normalisation. There's a quick demo to use Amazon Athena to use SQL to query the security data normalised and stored in the S3 bucket.
Brief intro and demo of AWS IAM Identity Center
Просмотров 13 тыс.2 года назад
This video walks you through the major feature of AWS IAM Identity Center, and why it can help you to streamline the user access to AWS environment, especially when you have multiple accounts with various roles/permissions that your users can assume.
One of the best video i ever seen!!!
Nice ❤❤❤
nice
Really great walkthrough of AWS GD 👌
So for this particular scenario, was it a specific IAM User affected or just an IAM role? In this scenario, would the role have to replaced or that specific IAM user's credentials replaced? Thanks!
What is your LinkedIn? Let’s connect
There are so little videos of actual demos, thanks bro❤
Thank you for this video. It is very helpful.
Nice man
Super...
nice and informative
Very informative...
❤ nice 👌 thanks
Great video
How did the malicious IP was already on suspected list?
This is a nice overview of the UI, and of the shape of a typical attack, but I'd like to have seen an attack that wasn't so simple for the system to detect. Alerting on a request from an IP that you already knew was suspicious is not exactly magic.
Don't record educational videos with background music.
Good feedback. Background music is removed for latest videos in the channel: ruclips.net/channel/UCkpx26xQHQJu8i2ABxHE11w
Can you show the lambda function that is used for decryption
Can you show the lambda function that is used for decryption
super
Thank you very much for all your videos. This one helped me a lot. I have have been looking for a way to connect API link to my AWS Chatbot and then link to my website.
Where to get the icons and what software you use for the presentation?
aws.amazon.com/architecture/icons/
First
How to create a Database and Table? I think you should have shown this step
There're various ways to create the table, while this video focusing on the query part. You may refer to the following if you are interested in table creation: docs.aws.amazon.com/athena/latest/ug/cloudtrail-logs.html
Thanks. I am in the same boat. the table creation and database is what i needed before the query running
Permission Sets ?
Good afternoon, do you think it is possible to hide, for example, the email and account id?
If you are talking about the info shown in the video, then yes - that's something gonna be improved in future videos.
@@mrtaller oh great, yes, I mean that id and email that appears in the center box when the user logs into identity center.
Great content and thanks for putting it together.
great presentation
You haven't shown that how you have set permission for group
Depending on your use case, you can refer to the permission sets definition, either use predefined permissions, or custom permissions. docs.aws.amazon.com/singlesignon/latest/userguide/permissionsetsconcept.html
Thank you for creating this video
Good introduction and demo! Well done!
good vidéo ;)
Thank you for the video. It would be better without music though.
Got it. Thanks for your feedback.
Super useful and compact demo. Keep up the good work.
Thank you, and glad that you found it helpful :)
I am very new in aws and the part of permission set was no clear. Neither the part of the respective accounts but still was very good video. Thank you
Thanks Jerry 😊
Glad you liked it 👍
Great video! Thanks ;)
Very good and insightful demo.
Glad you like it, and thanks for watching!
🎉 "promosm"!!
Very useful, thank you!
Thanks for watching and your feedback!