Cloud Security Podcast cover image

Threat Hunting in AWS

Cloud Security Podcast

00:00

Cloud Trail vs Threat Hunting?

Adalis config is usually used for conformance pacts and rules. But it also has a feature that isn't really even exposed well in the in the ui logi, of snapshots of all the configurations of all the resources. And then this is wonderful for hunting, because you can look for resources that may have, may not exist even now, but exist at a certain point of time. If you find something from data n the past that polly most likely still does exist in the current data,. So we've got the prima sortit. Are ther any of the ones at utin car jucye enough that maybe you have your eyes on, or maybe other people can

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app