L3 SOC Analyst: AWS Incident Investigation with Splunk
Master AWS incident investigation using Splunk: from data integration to automated response, elevate your SOC analyst skills.
...
Share
Setting Up the Foundation: AWS Data Sources and Splunk Integration
Unit 1: AWS Data Sources for Security
CloudTrail Overview
Configuring CloudTrail
VPC Flow Logs Explained
Enabling VPC Flow Logs
GuardDuty Intro
Unit 2: Splunk Integration with AWS
Splunk AWS Add-on
Configuring the Add-on
Data Ingestion Methods
Validating Data Ingestion
Index Configuration
Unit 3: Best Practices for AWS Data in Splunk
Data Normalization
Field Extractions
Timestamp Handling
Data Retention Policies
Security Considerations
Threat Detection: Crafting Splunk Queries for AWS Security Monitoring
Unit 1: Splunk Query Fundamentals for AWS Security
Intro to Splunk SPL
Filtering AWS Data
Transforming AWS Data
Aggregating AWS Data
Common Errors in SPL
Unit 2: Detecting Suspicious Activity in AWS
Unauthorized Access
Data Exfiltration
Malicious Code Execution
Privilege Escalation
Unusual Activity
Unit 3: Creating Dashboards and Alerts
Building Dashboards
Alerting Logic
Alert Fatigue
Correlation Searches
Real-World Examples
Incident Investigation: Analyzing and Responding to AWS Security Events
Unit 1: Investigating Unauthorized Access
Intro to Auth Issues
CloudTrail for Auth
IAM Role Analysis
Compromised Keys
Remediating Auth Issues
Unit 2: Analyzing Data Breaches
Data Breach Overview
S3 Data Exfiltration
DB Instance Breaches
EBS Snapshot Analysis
Breach Remediation
Unit 3: Compromised EC2 Instances
EC2 Compromise Intro
Unusual EC2 Activity
Malware Detection
Lateral Movement
EC2 Remediation
Unit 4: Incident Response Procedures
Incident Response Intro
Containment Strategies
Eradication Techniques
Recovery Processes
Post-Incident Activity
Automation and Reporting: Enhancing Incident Response with SOAR and AWS Security Services
Unit 1: SOAR Integration with Splunk and AWS
Intro to SOAR
Phantom Overview
Setting Up Phantom
Building Playbooks
Automated EC2 Isolation
Unit 2: AWS Security Services and Splunk
Security Hub Intro
Hub Integration
IAM Access Analyzer
GuardDuty Enhancement
Centralized Monitoring
Unit 3: Incident Reporting and Lessons Learned
Report Templates
Automated Report Gen
Executive Summaries
Remediation Steps
Continuous Improvement