Evading Logging in AWS CloudTrail - Security Techniques and Vulnerabilities
fwd:cloudsec via YouTube
The Fastest Way to Become a Backend Developer Online
Most AI Pilots Fail to Scale. MIT Sloan Teaches You Why — and How to Fix It
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn how attackers can bypass AWS CloudTrail logging through a 40-minute conference talk that explores both common and advanced evasion techniques. Discover real-world methods used to disable CloudTrail monitoring, understand vulnerabilities that enable stealthy reconnaissance without leaving traces, and gain insights into how security teams can respond to these threats. Dive deep into the technical aspects of AWS API manipulation, including undocumented APIs and non-production endpoints, while understanding the implications for account-level trails and overall cloud security. Gain practical knowledge about protecting cloud environments from sophisticated attacks that attempt to circumvent security logging mechanisms.
Syllabus
Introduction
What is CloudTrail
Account Level Trails
AWS API
Undocumented API
Nonproduction endpoints
Non production endpoints
Questions
Taught by
fwd:cloudsec