redblue.team
red|blue: AWS Security: Automating Palo Alto firewall rules with AWS Lambda
http://www.redblue.team/2016/07/aws-security-automating-palo-alto.html
Offensive tactics, defensive countermeasures, threat analysis, and assorted ramblings. Go easy, we're learning as we go! Follow us on twitter @epicism1 @g kay c. Tuesday, July 19, 2016. AWS Security: Automating Palo Alto firewall rules with AWS Lambda. In this post, I will go over the different components of my. Code, its design, and then show it in action. Finally i will list a number of notes and considerations as well as a link to download the code. Palo Alto instances can be accessed from the. Author...
redblue.team
red|blue: July 2016
http://www.redblue.team/2016_07_01_archive.html
Offensive tactics, defensive countermeasures, threat analysis, and assorted ramblings. Go easy, we're learning as we go! Follow us on twitter @epicism1 @g kay c. Tuesday, July 26, 2016. Audit Logging Configuration for the Linux Environment. One challenge to performing a proper incident investigation is dealing with missing event logs. Part of a healthy SOC posture is ensuring that you have the proper audit logging settings to ensure that you log what is needed tomorrow. Windows has a very well. Next, the...
securitynik.blogspot.com
Learning by practicing: July 2016
http://securitynik.blogspot.com/2016_07_01_archive.html
Learning is an ongoing activity . practicing makes it fun. Friday, July 15, 2016. AWS Security: Automating Palo Alto security rules with AWS Lambda. In this post, I will go over the different components of my code, its design, and then show it in action. Finally i will list a number of notes and considerations as well as a link to download the code. Palo Alto instances can be accessed from the. Palo Alto provides excellent documentation on how to set up a gateway in the AWS, and I would recommend to start.