Log Lines Category
Control Plane
Cloud Infrastructure
Network Logs
Service - Control Plane Logs
Container Infrastructure
RDS
DynamoDB
Lambda
ALB
CloudFront
Operational Plane
Pipelines
Identity Usage
Data Plane
Application Logs
Service - Data Plane Logs
High Fedility Events
GenAI
Canonical Model (e.g OCSF) -> Log Corelation and Pattern and Anomaly detection
Writing Query based on underlying Logline Data model
Analyzing and summarising the impact of Event
Use-Case
Identified based on Threat Models and appropritate logs lines being ingejsted
Standard Operational Hygine related to Known Good Security posture
Threat Domain Coverage
Cloud Platform
Log Lines
CloudTrail
Management Event
Data Event
Insights
VPC Flow Logs
DNS Query Logs
CloudWatch Logs
S3 - Access Logs
ALB Access Logs
WAF
Network Firewall
Personalized Health Dashboard
Cloud Security Posture Management - AWS Security Hub
Threat Intelligence - Amazon GuardDuty
Threat Intelligence (IP & Domains)
AWS Security
Third Party Threat Feed Providers
Proofpoint
CrowdStrike
Custom Threat List
Anomaly Detection & Machine Learning
EC2 Findings
IAM Findings
S3 Findings
Kubernetes Findings
Pivot to Amazon Detective
Automated Response & Remediation
Integration with AWS Security Hub
EventBridge (Enrichment, Actions, Notifications)
Amazon GuardDuty Partners
Continious Compliance - AWS Config
Configuration Item
Metadata
Attributes
Relationships
Current Configuration
Resource Inventory
Resource Relationship
Configuration Management
Configuration Drift
Continuous Compliance
Compliance Dashboard
Security Analysis
Native SQL like Query
Compliance Rules
Managed Rules
Custom Rules
Remediation
Vulnerability Scanner - Amazon Inspector
EC2 Scanning
ECR Scanning
Network Reachability
Configuration Analyzed
Scoring
Service
TCP Ports
UDP ports
Internet Path Rating
Open path Rating
Managed Threat Hunting -AmazonDetective
Features
Automatic Data collection
Consolidate events in graph model
Interactive visualization
Use Cases
Incident Investigation
Threat Hunting
Root cause analysis
Behaviour Graph
Entities Relationship
Finding Overview
Summary of findings
Data Protection - Amazon Macie
Data Discovery
Data Classification
Data Security Posture
Remediation with Security Hub
8. Access Analyzer
Identify resources shared with external entities
9. Firewall Manager
Manage Security Groups
Manage WAF ACLs
Identity
Directory Service
Single Sign On
PIM/PAM
UBA - User Behavioural Analytics
Operating System
Memory Analysis
Disk Analysis
Patch Management
Endpoints
Anti-Virus
Anti-Malware
Anti Phishing
WAF
Application
Web Application Vulnerabilities - OWASP
Static Code Analysis
SIEM Sizing & Log Ingestion Strategy
How many log lines are considered - EPS?
Frequency & volume of logs
Log Structure - Data Formats
Log data sources inventory
Log Ingestion Latency
Log ingestion mechanism
Batch or Stream
Parsing and Normalization
Agent or API integration
Data Retention in SIEM
Is SIEM your data lake?
Threat Management - 5 Execution Domains
Identify
Inventory of Assets and Vulnerabilities
Detect
Logging Maturity
Know any Vulnerabilities are been exploited
Look for IoC
Threat Intel
Deviation from Baseline
Use-Case specific Anomaly Detection
Event Identification and Alerting
MTTD - MTTR
Query and Log - CoRelation
Investigate
Root cause
lateral movement
Response
Containment
Isolation
Runbook and Automation
Restore
RTO
RPO
Forensics