Skip to content

Builder Sessions

Title Description
Getting hands-on with Amazon GuardDuty In this hands-on builder session, you will walk through a scenario covering threat detection and remediation using Amazon GuardDuty; a managed threat detection service. The scenario simulates an attack that spans a few threat vectors, representing just a small sample of the threats that GuardDuty is able to detect. In addition, you will look at how to view and analyze GuardDuty findings, how to send alerts based on the findings, and, finally, how to remediate findings.
  • Level: Intermediate
  • Duration: 1 hour
  • NIST CSF Functions: Protect, Detect, Respond
  • CAF Components: Preventative, Detective, Responsive
  • Services: Amazon CloudWatch, Amazon GuardDuty, AWS CloudTrail, AWS Lambda, Security Groups, Amazon SNS
Mitigate Risks Using Cloud-Native Infrastructure Security In this hands-on builder session, we help you identify which cloud-native solutions can mitigate the same risks while providing scalability, reliability, and cost optimization at a low operational burden. During this workshop, you will learn how to use cloud native controls like CloudTrail, Security Groups, GuardDuty and many more, to secure your cloud architecture.
  • Level: Intermediate
  • Duration: 1 hour
  • NIST CSF Functions: Prevent, Detect
  • CAF Components: Preventative, Detective
  • Services: Amazon CloudWatch, Amazon GuardDuty AWS CloudTrail, AWS Config, Security Groups, Network ACLs
Permission Boundaries: How to Truly Delegate Permissions on AWS Permission boundaries is probably one of the most important new IAM feature that has launched in awhile. This feature addresses a longstanding customer issue, namely, how do I delegate administration to my users. If you have developers that need to be able to create roles for Lambda functions, system administrators that need to be able to create IAM roles and users, or any similar scenario, then you need permission boundaries.
  • Level: Intermediate
  • Duration: 1 hour
  • Services: AWS IAM Permission Boundaries
  • Focus: Delegated Administration
Using AWS Secrets Manager with Amazon RDS and AWS Fargate This Secrets Manager Builder Session guides you through the use of AWS Secrets Manager with Amazon RDS and AWS Fargate. In the first phase of the Builder Session, you will access the RDS data base with Secrets Manager. You will then use Secrets Manager to rotate the data base password. You will then use Secrets Manager to access the data base again to show that you can continue to access the data base after the rotation.

In the second phase of the Builder Session, you will extend your use of Secrets Manager into an AWS Fargate container. You will create an Amazon ECS task definition to pass secrets to the Fargate container and then launch the Fargate container. You will then SSH into the container to show that the secret was passed to the container and that you can access the RDS data base.
  • Level: 300
  • Duration: 1 hour
  • NIST CSF Functions: Prevent
  • CAF Components: Preventative
  • Services: AWS Secrets Manager, Amazon RDS, AWS Fargate