AWS cli based incident response playbook

0

previously we have linux cli based playbook to identify linux attack, like cat /etc/passwd, netstat -anp, in AWS cloud, do we have a cli based incident response playbook? can anyone share the command list for investigating AWS compromise(EC2, IAM,S3) and AWS kubernetes compromise? thanks

asked 2 years ago394 views
2 Answers
1
AWS
answered a year ago
0

For general AWS Security, I would start here: https://aws.amazon.com/architecture/security-identity-compliance/. The AWS whitepaper covers a lot of AWS security, including Detection which would be how to investigate/detect strange behavior.

AWS has a service called GuardDuty that comes with security checks: https://aws.amazon.com/guardduty/. For pricing information, check https://aws.amazon.com/guardduty/pricing/.

GuardDuty will analyze VPC Flow Logs, AWS CloudTrail management event logs, CloudTrail S3 data event logs, and DNS logs for suspicious events.

For Incident Response, here's a start: https://aws.amazon.com/premiumsupport/knowledge-center/potential-account-compromise/ This is another guide that AWS publishes: https://docs.aws.amazon.com/whitepapers/latest/aws-security-incident-response-guide/welcome.html.

jsonc
answered 2 years ago

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.

Guidelines for Answering Questions