Fashion App’s Faux Pas: Open Buckets of (21) Buttons
In our last post we covered getting started with Security Hub and how to set up an optimized configuration, including prepping forward findings for alerting or remediation. Now although we’ve introduced the core capabilities, in this post we’ll walk through the different parts of the console...
Continuing our dive into AWS Security hub let’s jump into setting up. Don’t worry, I won’t just rehash the AWS documentation; this post will cover our recommended configuration, how to push findings and events back into your security infrastructure...
Like many AWS services, Security Hub is one of those products that sneaks up on you. Security Hub was pretty anemic when it first launched; it appeared to just collect the results from a few AWS products and a dozen partners into some basic dashboards so Amazon could say they had a “security center”.
Advanced Techniques for Defending AWS ExternalIDs and Cross-Account AssumeRole
Don’t Start Static – Mitigating Cloud API Credential
The Overly-Complex Way CloudTrail and CloudWatch Events Work