AWS cli based incident response playbook

0

previously we have linux cli based playbook to identify linux attack, like cat /etc/passwd, netstat -anp, in AWS cloud, do we have a cli based incident response playbook? can anyone share the command list for investigating AWS compromise(EC2, IAM,S3) and AWS kubernetes compromise? thanks

質問済み 2年前364ビュー
2回答
1
AWS
回答済み 1年前
0

For general AWS Security, I would start here: https://aws.amazon.com/architecture/security-identity-compliance/. The AWS whitepaper covers a lot of AWS security, including Detection which would be how to investigate/detect strange behavior.

AWS has a service called GuardDuty that comes with security checks: https://aws.amazon.com/guardduty/. For pricing information, check https://aws.amazon.com/guardduty/pricing/.

GuardDuty will analyze VPC Flow Logs, AWS CloudTrail management event logs, CloudTrail S3 data event logs, and DNS logs for suspicious events.

For Incident Response, here's a start: https://aws.amazon.com/premiumsupport/knowledge-center/potential-account-compromise/ This is another guide that AWS publishes: https://docs.aws.amazon.com/whitepapers/latest/aws-security-incident-response-guide/welcome.html.

jsonc
回答済み 2年前

ログインしていません。 ログイン 回答を投稿する。

優れた回答とは、質問に明確に答え、建設的なフィードバックを提供し、質問者の専門分野におけるスキルの向上を促すものです。

質問に答えるためのガイドライン

関連するコンテンツ