Detecting Root Hackers on AWS, Preventing Bitcoin Mining and then Visualizing Threat History
Disclaimer: While I am an AWS Employee — my thoughts, processes and designs are my own and are not sponsored, directed or owned by the company.
We’ll be using AWS Eventbridge, Config, Systems Manager, Simple Notification Service, Input transformer a...