Sweet Deception - Mastering AWS Honey Tokens to Detect and Outsmart Attackers
fwd:cloudsec via YouTube
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn advanced AWS honey token strategies in this 23-minute conference talk that explores how to leverage deliberately exposed access keys as powerful detection mechanisms against threat actors. Discover the critical importance of honey tokens given that approximately 66% of AWS security incidents originate from leaked access keys, and understand how defenders can transform this common attack vector into a strategic advantage. Explore different types of honey tokens, their underlying mechanisms, and potential evasion techniques that sophisticated attackers might employ. Delve into the internals of the AWS API to understand how advanced honey tokens can trigger alerts even when used with undocumented APIs and non-production endpoints. Master the nuances that distinguish effective honey tokens from those that can be easily bypassed by knowledgeable threat actors. Gain insights into detection strategies for sophisticated attackers and learn how to implement honey tokens that provide reliable alerting capabilities. Examine real-world scenarios where honey tokens can be deployed effectively within AWS environments to create early warning systems for unauthorized access attempts. Whether you're new to deception technology or an experienced security practitioner, acquire the knowledge needed to implement robust honey token strategies that help you stay ahead of evolving threats in cloud environments.
Syllabus
Sweet Deception: Mastering AWS Honey Tokens to Detect and Outsmart Attackers
Taught by
fwd:cloudsec