Skip to main content

Securing Cloud-Native Architecture—A Journey through the Attacker's Lifecycle

Date

Time

-

Location

TBD

Cloud infrastructure today is a complex relationship between hosts, containers, managed cloud services, and cloud resources like blob storage, users and roles, and the control plane. To effectively secure cloud infrastructure, it’s critical to correlate information from a variety of sources, particularly information about the state of resources coupled with detection of suspicious and anomalous activity within those resources.

 

In this workshop, you will wear the hat of an engineer investigating a cloud-native attack using real-world techniques against a real AWS environment. After familiarizing yourself and experimenting with the infrastructure, —you will identify and investigate the full extent of the attack, using Datadog Cloud Security Posture Management and Cloud Workload Security to capture the entire attacker lifecycle and before ultimately remediating it. You will also experience how valuable observability is when investigating security incidents!

sharing to your network