Securing Cloud-Native Architecture—A Journey through the Attacker's Lifecycle
Modern cloud infrastructure is complex. It can comprise a wide range of connected hosts, containers, managed cloud services, and of course cloud resources like blob storage, users and roles, and the cloud control plane. To effectively secure cloud infrastructure, it’s critical to correlate information from a variety of sources, including information about the state of resources coupled with detection of suspicious and anomalous activity within those resources. In this workshop you will learn by acting as both attacker and defender. You will attack your infrastructure using the latest popular attack vectors for cloud environments, and you will detect and respond to your attack using Datadog CSPM and CWS to capture the entire attacker lifecycle.