π Amazon Security Lake:
https://aws.amazon.com/blogs/aws/preview-amazon-security-lake-a-purpose-built-customer-owned-data-lake-service/
Security Lake automatically collects logs for:
β AWS Health Dashboard
β CloudTrail
β Firewall Manager
β GuardDuty
β IAM Access Analyzer
β Inspector
β Lambda
β Macie
β Route 53
β S3
β Security Hub
β Systems Manager Patch Manager
β VPC
Security Lake automatically partitions and converts incoming log data to a storage and query-efficient Apache Parquet and OCSF format.
Security Lake supports third-party sources providing OCSF security data, including Barracuda Networks, Cisco, Cribl, CrowdStrike, CyberArk, Lacework, Laminar, Netscout, Netskope, Okta, Orca, Palo Alto Networks, Ping Identity, SecurityScorecard, Tanium, The Falco Project, Trend Micro, Vectra AI, VMware, Wiz, and Zscaler.
#Security_Lake
https://aws.amazon.com/blogs/aws/preview-amazon-security-lake-a-purpose-built-customer-owned-data-lake-service/
Security Lake automatically collects logs for:
β AWS Health Dashboard
β CloudTrail
β Firewall Manager
β GuardDuty
β IAM Access Analyzer
β Inspector
β Lambda
β Macie
β Route 53
β S3
β Security Hub
β Systems Manager Patch Manager
β VPC
Security Lake automatically partitions and converts incoming log data to a storage and query-efficient Apache Parquet and OCSF format.
Security Lake supports third-party sources providing OCSF security data, including Barracuda Networks, Cisco, Cribl, CrowdStrike, CyberArk, Lacework, Laminar, Netscout, Netskope, Okta, Orca, Palo Alto Networks, Ping Identity, SecurityScorecard, Tanium, The Falco Project, Trend Micro, Vectra AI, VMware, Wiz, and Zscaler.
#Security_Lake
Amazon
Preview: Amazon Security Lake β A Purpose-Built Customer-Owned Data Lake Service | Amazon Web Services
To identify potential security threats and vulnerabilities, customers should enable logging across their various resources and centralize these logs for easy access and use within analytics tools. Some of these data sources include logs from on-premises infrastructureβ¦
π5π₯4