Month: April 2021

AWS Centralized Logging & Observability

I always got this question from customers. How do I do the best mechanism for logging on my applications on AWS. This implementation guide discusses architectural considerations and configuration steps for deploying the Centralized Logging solution in the Amazon Web Services (AWS) Cloud. It includes links to AWS CloudFormation templates that launch, configure, and run the AWS …

AWS Centralized Logging & Observability Read More »

AWS Incident Response – Unintended Access to S3 bucket

Incident Type Unintended access to an S3 Bucket Summary This runbook is provided to be used as a template only. It should be customized by administrators working with AWS to suit their particular needs, risks, available tools and work processes. It is not official AWS documentation and is provided as-is to customers using AWS products …

AWS Incident Response – Unintended Access to S3 bucket Read More »

AWS Incident Response – runbook template for Credential leakage

Incident Type Credential Leakage/Compromise Summary These run-books are created to be used as templates only. They should be customized by administrators working with AWS to suit their particular needs, risks, available tools and work processes. These guides are not official AWS documentation and are provided as-is to customers using AWS products and who are looking …

AWS Incident Response – runbook template for Credential leakage Read More »

AWS Incident Response runbooks template – DDoS attack

Incident Type Web Application Dos/DDoS Attack Summary These run-books are created to be used as templates only. They should be customized by administrators working with AWS to suit their particular needs, risks, available tools and work processes. These guides are not official AWS documentation and are provided as-is to customers using AWS products and who …

AWS Incident Response runbooks template – DDoS attack Read More »