Beyond Firewalls: Techniques for Protecting a Cloud-Based Assets
When a system designed for on-premises operation is migrated to a public cloud, it is exposed to additional vulnerabilities and risks of exploitation. This workshop will delve into the realm of cloud native security solutions and techniques, to demonstrate how it is possible to protect such systems that are otherwise considered indefensible particularly in the case of ‘Lift and Shift’.
This workshop will require participants to have an Azure account with full administrative rights.
The source code for the lab is here
You can use my automated attack server to generate traffic and logs. This service is monitored and abuse will result in your traffic being blocked / misdirected / faked / returned. Click here to access this service
The walkthorugh of the lab and all resources required:
Designed with a hands-on approach, this workshop serves as a practical showcase of security control implementation, logging procedures, and data analytics. It’s important to note that this isn’t an in-depth exploration but rather a concentrated effort aimed at illustrating the technologies and methodologies of basic security implentations extending on the content of SANS courses SEC388: Introduction to Cloud Computing and Security, as well as SEC488: Cloud Security Essentials. Geared towards those new to the cloud environment, including novices and beginners, this workshop provides a tangible introduction to the cloud curriculum.