3min chapter

Cloud Security Podcast cover image

Threat Hunting in AWS

Cloud Security Podcast

CHAPTER

Cloud Trail vs Threat Hunting?

Adalis config is usually used for conformance pacts and rules. But it also has a feature that isn't really even exposed well in the in the ui logi, of snapshots of all the configurations of all the resources. And then this is wonderful for hunting, because you can look for resources that may have, may not exist even now, but exist at a certain point of time. If you find something from data n the past that polly most likely still does exist in the current data,. So we've got the prima sortit. Are ther any of the ones at utin car jucye enough that maybe you have your eyes on, or maybe other people can

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode