#aws
Read more stories on Hashnode
Articles with this tag
In this path as a defender, you'll investigate a successful attack by using jq & Athena to analyze CloudTrail logs in JSON. · This is a walkthrough of...
What should you know as a cloud security engineer or for a cloud security interview? · A list of things to know as a cloud security engineer or for a...
In this path as an attacker, you’ll exploit your way through misconfigurations in Lambda (serverless functions) and containers in ECS Fargate. · This is...
Respond to an AWS security incident by analyzing cloud trail logs. · This is a walkthrough for "Bucket" by CyberDefenders Scenario Video...
Flaws.Cloud - Learn about common mistakes and gotchas when using Amazon Web Services (AWS) including S3, IAM, EC2, and more. · This is my walkthrough for...