This is a nice overview of the UI, and of the shape of a typical attack, but I'd like to have seen an attack that wasn't so simple for the system to detect. Alerting on a request from an IP that you already knew was suspicious is not exactly magic.
So for this particular scenario, was it a specific IAM User affected or just an IAM role? In this scenario, would the role have to replaced or that specific IAM user's credentials replaced? Thanks!
Really great walkthrough of AWS GD 👌
Great content and thanks for putting it together.
This is a nice overview of the UI, and of the shape of a typical attack, but I'd like to have seen an attack that wasn't so simple for the system to detect. Alerting on a request from an IP that you already knew was suspicious is not exactly magic.
great presentation
Very good and insightful demo.
Glad you like it, and thanks for watching!
Very informative...
So for this particular scenario, was it a specific IAM User affected or just an IAM role? In this scenario, would the role have to replaced or that specific IAM user's credentials replaced? Thanks!
Nice ❤❤❤
How did the malicious IP was already on suspected list?
nice