Skip to content

gustavo89587/cloud-security-labs-aws

Repository files navigation

☁️ Cloud Security Labs β€” AWS Hands-on AWS cloud security labs focused on visibility, detection, and incident response from a SOC perspective. This repository demonstrates how security teams monitor, detect and respond to threats in AWS environments using logs, telemetry and security best practices.

🎯 Objective To showcase practical cloud security operations aligned with SOC workflows, including: Visibility and logging Detection use cases Incident investigation Security posture hardening This is cloud security for defenders, not architecture theory.

🧠 Cloud Security Perspective In cloud environments, security depends on: Telemetry first (logs and signals) Contextual detections Fast investigation Clear ownership between cloud and SOC These labs reflect that reality. πŸ” What You’ll Find Here βœ” AWS security monitoring scenarios βœ” CloudTrail analysis βœ” IAM security use cases βœ” Network visibility and anomalies βœ” Detection ideas mapped to SOC operations βœ” Incident response considerations in cloud πŸ›‘οΈ Key AWS Security Components Covered

AWS CloudTrail IAM & Access Analysis VPC Flow Logs S3 Security & Logging Security monitoring concepts Cloud-native detection ideas

πŸ§ͺ Example Scenarios Suspicious IAM activity Abnormal API calls Unauthorized access attempts Misconfiguration leading to exposure Cloud incident investigation workflow Each scenario answers: β€œHow would a SOC detect and investigate this in AWS?”

🧩 Detection & Response Flow Copiar cΓ³digo Text AWS Logs & Telemetry ↓ Detection Logic ↓ Context Enrichment ↓ SOC Investigation ↓ Response & Mitigation πŸ“‚ Repository Structure

cloud-security-aws/ β”œβ”€β”€ logs/ β”‚ β”œβ”€β”€ cloudtrail-samples.json β”œβ”€β”€ detections/ β”‚ β”œβ”€β”€ iam-anomalies.md β”‚ β”œβ”€β”€ api-abuse.md β”œβ”€β”€ response/ β”‚ └── incident-response.md └── README.md

πŸ› οΈ Tools & Concepts Applied AWS logging & telemetry Cloud security monitoring IAM security analysis Detection logic (tool-agnostic) SOC investigation workflows Cloud incident response concepts

🧠 Why This Matters Many SOC analysts struggle in cloud environments because: logs are misunderstood detections lack context ownership is unclear This repository demonstrates how SOC thinking translates to the cloud.

🎯 Target Audience SOC Analysts Cloud Security Analysts Detection Engineers Blue Team Engineers Security Operations Teams

πŸ‘€ Author Gustavo Okamoto Cybersecurity Analyst | SOC / SIEM | Threat Detection & Incident Response | Blue Team Cloud Security β€’ Detection Engineering β€’ Automation

πŸ”— GitHub: https://github.com/gustavo89587 πŸ”— LinkedIn: https://linkedin.com/in/gustavo-okamoto-de-carvalho-ti

⭐ Star this repository if you value practical cloud security for SOC teams.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages