Utilize Managed Disks for Virtual Machines
Related Videos

10.6.1 – Review Daily All Security Events and Logs of All System Components.mp4

10.6.2 – Review Logs of All Other System Components Based Policies and Risk Management Strategy

10.6.3 –Follow Up Exceptions and Anomalies Identified During the Review Process

Audit Trail Review with Kibana, Athena, and GuardDuty

Audit Your Security Groups for Insecure Ports and Protocols

Change-Detection Solutions in AWS

Configure Activity Log Container Access to Private

Configure Storage Accounts to Use Customer Managed Keys

Create Activity Log Alert for Delete SQL Server Firewall

Create an Activity Log Alert for Create or Update Public IP Address

Create an Activity Log Alert for Delete Security Solution

Disabling Insecure Ports and Protocols

Enable Access Transparency to Monitor Google Cloud Engineer Access

Enable Alerting for Cloud Storage IAM Permission Changes

Enable Bucket Lock to Protect Sink Destinations from Modification

Enable Cloud Audit Logging Across Your Project

Enable Cloud DNS Logging for VPC Networks

Enable Logging of Read, Write, and Delete Requests for Blob Service

Enable Logging of Read, Write, and Delete Requests for Table Service

Enable Queue Storage Logging for Read Write Access

Ensure ALBs Have WAF ACLs Attached

Ensure Alerts Exist for Project Ownership Changes

Ensure Alerts are Received for VPC Network Changes

Ensure Diagnostic Setting Captures Appropriate Categories

Ensure Log Alert Exists for Create or Update Network Security Group

Ensure Logging for AppServiceHTTPLogs

Ensure Network Security Group Flow Logs Are Sent to Log Analytics

Ensure RDS Instances are Only Accessible by Internal IPs

Ensure That a Diagnostic Setting Is Enabled

Ensure an Activity Log Alert Exists for Delete Public IP Address

Ensuring Role Assumption is Logged

Establish a Log Metric Alert for Configuration Changes in SQL Instances

Filters and Alarms in CloudWatch

Generate Log Metric Alerts for Custom Role Changes

GuardDuty Alerts for Control Failures

Historically View Project Resources in Asset Inventory

How to Edit Inbound Traffic Rules for Default Security Groups

Identify Unrestricted Access to Ports for Security Groups

Identify if EC2 Instances Are Directly Connected to the Internet

Introduction to Amazon CloudWatch

Leverage Google Cloud Engineers by Granting Access Approval

Log and Retain All Relevant Activities

Logging Web ACL Data in Amazon Kinesis

Monitor Your Environment with Network Watcher

Monitor for "Delete Network Security Groups" Through Log Alerts

PCI Requirement 10 – Track and Monitor all Access to Network Resources and Cardholder Data

PCI Requirement 10.1 – Implement Audit Trails to Link all Access to System Components

PCI Requirement 10.2 – Implement Automated Audit Trails for all System Components

PCI Requirement 10.2.1 – All Individual User Accesses to Cardholder Data

PCI Requirement 10.2.2 – All Actions Taken by Any Individual with Root or Administrative Privileges

PCI Requirement 10.2.3 – Access to All Audit Trails

PCI Requirement 10.2.4 – Invalid Logical Access Attempts.mp4

PCI Requirement 10.2.5 – Use of and Changes to Identification Accounts with Root Privileges

PCI Requirement 10.2.6 – Initialization, Stopping, or Pausing of the Audit Logs

PCI Requirement 10.2.7 – Creation and Deletion of System-Level Objects

PCI Requirement 10.3 – Record at Least the Following Audit Trail Entries for All System Components

PCI Requirement 10.3.1 – User Identification

PCI Requirement 10.3.2 – Type of Event

PCI Requirement 10.3.3 – Date and Time

PCI Requirement 10.3.4 – Success or Failure Indication

PCI Requirement 10.3.5 – Origination of Event

PCI Requirement 10.3.6 – Identity or Name of Affected Data, System Component, or Resource

PCI Requirement 10.4 – Using Time-Synchronization Technology, Synchronize All Critical Systems

PCI Requirement 10.4.1 – Critical Systems Have the Correct and Consistent Time

PCI Requirement 10.4.2 – Time Data is Protected

PCI Requirement 10.4.3 – Time Settings Are Received from Industry-Accepted Time Sources

PCI Requirement 10.5 – Secure Audit Trails so They Cannot Be Altered

PCI Requirement 10.5.1 – Limit Viewing of Audit Trails to Those with a Job-Related Need

PCI Requirement 10.5.2 – Protect Audit Trail Files from Unauthorized Modifications

PCI Requirement 10.5.3 – Promptly Back Up Audit Trail Files to a Centralized Log Server

PCI Requirement 10.5.4 – Write Logs for External-Facing Technologies onto a Secure Device

PCI Requirement 10.5.5 – Use File-Integrity Monitoring or Change-Detection Software on Logs

PCI Requirement 10.6 – Review Logs and Security Events for All System Components

PCI Requirement 10.7 – Retain Audit Trail History for at Least One Year, with Three Months Available

PCI Requirement 10.8 –Implement a Process for the Detection of Failures of Critical Control Systems

PCI Requirement 10.8.1 –Respond to Failures of Any Critical Security Controls in a Timely Manner

Protecting API Gateways with WAF Rules

Receive Alerts for Audit Configuration Changes

Receive Alerts for VPC Network Firewall Rule Changes

Restrict Security Group Access to All Ports

Retaining Your Audit Trail in AWS

Routing Outbound Traffic Through NAT Gateways

Secure Logging Within GKE

The Difference Between NACLs and Security Groups

Use Cloud Logging Sinks to Retain Logs

Using Amazon Time Sync Service

Using a Bastion Host or Session Manager to Limit Access to Port 22

Utilize Flow Logs to Log Traffic in Your Environment

Utilize Log Alerts for Create or Update SQL Server Firewall

Utilize Log Alerts for Create or Update Security Solution

Utilize Logging for Azure Key Vault

VPC Network Route Changes Should Trigger Alerts

Verify Log Alert Exists for Create Policy Assignment

Verify Log Alert Exists for Delete Policy Assignment