security
Cloud Attacks
IAM Abuse
Storage Abuse
Compute Abuse
science
Research
rule
Detection Rules
CloudTrail Rules
Splunk Rules
Sigma Rules
map
Attack Detection Map
Technique → Detection
architecture
Defense Architecture
IAM Design
Monitoring Strategy
build
Tools
Adversary Platform
Detection Generator
menu
search
Search
GitHub
Twitter / X
RSS
Enable dark mode
Enable light mode
to navigate
to select
to close
cancel
Home
Research
On this page
Research
Latest Findings
Methodology
Table of Contents
Research
Latest Findings
Methodology
science
Research
Latest AWS attack path discoveries and detection research.