The Fog of Cloud Security Logging
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
Intro
Public Cloud Security Threats
Opportunities To Detect Attacks, Data Exfiltration
Clear The Log Fog
Public Cloud Security Program
Approach
Cloud Logs by Cloud Services
Monitor Critical Events & Activities
Context Based Monitoring
Log Types, Critical Events & Attributes
Cloud Security Insights Matter
Multi-Cloud Logging Architecture - On-Premises SIEM
Multi-Cloud Logging Architecture - CSP Cloud SIEMS
Critical Attributes For Log Monitoring
AWS Network Log
Use-case: System visibility for Compute
Use-case: AWS Audit Logging
Use-case: Network visibility for Security Events
Azure Active Directory Logs
Use-case: Automated Agent Deployment
Use-case: Network & Resource visibility for Security Events
Take Away Checklist
Taught by
RSA Conference
Related Courses
Introduction to Office 365 Development and APIsMicrosoft via edX Managing Identity
Microsoft via edX Extend Your Application with REST Services
Microsoft via edX Enhance Your Desktop App with Cloud Services
Microsoft via edX Fundamentos de Microsoft Azure
Universidad Francisco Gavidia via MirÃadax