Cloud Security Podcast cover image

Threat Hunting in AWS

Cloud Security Podcast

00:00

Is There Any Hope for Those Ones?

The only thing that changes is the source that peadres logged an the victims taltre logs, which andefinitely throw manders off. One extreme way could be just doleayor cloud trail log as you walk out and probaly the stre buckets where the cloud trail is being stored. But it's hard. You need to look. And also, like i mentioned earlier, the config logs, if you happen to log them, which is definitely non standard by any means, but it helps you recover rations of pasources. So and also, you can see some rations in cloud trail logs if you are to look for them.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app