This is a nice overview of the UI, and of the shape of a typical attack, but I'd like to have seen an attack that wasn't so simple for the system to detect. Alerting on a request from an IP that you already knew was suspicious is not exactly magic.
@sangameshwar456 Жыл бұрын
great presentation
@pramodkondapally5964 Жыл бұрын
Great content and thanks for putting it together.
@Crown_Asunder9 ай бұрын
So for this particular scenario, was it a specific IAM User affected or just an IAM role? In this scenario, would the role have to replaced or that specific IAM user's credentials replaced? Thanks!
@tanyagoel8547 Жыл бұрын
How did the malicious IP was already on suspected list?