Главная
Study mode:
on
1
Intro
2
Public Cloud Security Threats
3
Opportunities To Detect Attacks, Data Exfiltration
4
Clear The Log Fog
5
Public Cloud Security Program
6
Approach
7
Cloud Logs by Cloud Services
8
Monitor Critical Events & Activities
9
Context Based Monitoring
10
Log Types, Critical Events & Attributes
11
Cloud Security Insights Matter
12
Multi-Cloud Logging Architecture - On-Premises SIEM
13
Multi-Cloud Logging Architecture - CSP Cloud SIEMS
14
Critical Attributes For Log Monitoring
15
AWS Network Log
16
Use-case: System visibility for Compute
17
Use-case: AWS Audit Logging
18
Use-case: Network visibility for Security Events
19
Azure Active Directory Logs
20
Use-case: Automated Agent Deployment
21
Use-case: Network & Resource visibility for Security Events
22
Take Away Checklist
Description:
Explore TD Ameritrade's journey in solving cloud security logging across multiple platforms in this 54-minute RSA Conference talk. Delve into the human element of determining critical logs for cloud environments, and discover use cases and agile implementation strategies for enabling security logging on AWS and Azure to support incident response and threat management. Gain insights into public cloud security threats, opportunities for detecting attacks and data exfiltration, and approaches to clearing the log fog. Learn about cloud logs by cloud services, monitoring critical events and activities, and context-based monitoring. Examine multi-cloud logging architectures for on-premises SIEM and CSP Cloud SIEMS, and explore critical attributes for log monitoring. Investigate specific use cases for system visibility, audit logging, network visibility, and automated agent deployment across AWS and Azure environments. Conclude with a comprehensive takeaway checklist to enhance your cloud security logging practices. Read more

The Fog of Cloud Security Logging

RSA Conference
Add to list