Goodycybgoodycyb.hashnode.dev·Aug 30, 2023SANS AWS DetectionLifecycle Process Research the attack technique — Lab 1 Set up proper logging — Lab 2 Attack realistic assets — Lab 3 Review log data — Lab 4 Build detection — Lab 5 Prerequisites: An AWS account with administrator access NOTE: In this lab, y...4 likes·186 readsThreat Detection 💡🕵️♂️🕸️#sansAdd a thoughtful commentNo comments yetBe the first to start the conversation.