The Fog of Cloud Security Logging
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
Intro
Public Cloud Security Threats
Opportunities To Detect Attacks, Data Exfiltration
Clear The Log Fog
Public Cloud Security Program
Approach
Cloud Logs by Cloud Services
Monitor Critical Events & Activities
Context Based Monitoring
Log Types, Critical Events & Attributes
Cloud Security Insights Matter
Multi-Cloud Logging Architecture - On-Premises SIEM
Multi-Cloud Logging Architecture - CSP Cloud SIEMS
Critical Attributes For Log Monitoring
AWS Network Log
Use-case: System visibility for Compute
Use-case: AWS Audit Logging
Use-case: Network visibility for Security Events
Azure Active Directory Logs
Use-case: Automated Agent Deployment
Use-case: Network & Resource visibility for Security Events
Take Away Checklist
Taught by
RSA Conference
Related Courses
Architecting Microsoft Azure SolutionsMicrosoft via edX Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam Network Security
Georgia Institute of Technology via Udacity Microsoft Professional Orientation : Cloud Administration
Microsoft via edX Cyber Threats and Attack Vectors
University of Colorado System via Coursera