Google Cloud Incident Response Cheat Sheet Logo

Google Cloud Incident Response Cheat Sheet

0
Free
Visit Website

Google Cloud Platform Forensics provides a comprehensive overview of incident response in GCP, including logs for threat hunting and incident response, log analysis, and admin console cloud logging. It involves understanding existing infrastructure and investigating malicious activity derived from control plane activity. The tool provides five categories of forensic data, including alerts, logs, configurations, reports, and service data, and utilizes GCP native tooling such as Security Command Center, Logs Explorer, BigQuery, Metrics Explorer, Policy Analyzer, and Asset Inventory. The tool tracks various logs, including Admin, User, OAuth, SAML, Groups, and Security logs, which can be used for threat hunting and incident response. These logs provide valuable insights into API calls, user events, and configuration changes, enabling effective incident response and threat hunting in GCP environments.

FEATURES

ALTERNATIVES

A comprehensive guide to Python 3 syntax, features, and resources in a single image.

A comprehensive guide to reverse engineering by Dennis Yurichev, available for free download in multiple languages and formats, with praise from cybersecurity experts.

A comprehensive SQL injection cheat sheet covering various database management systems and techniques.

ENISA Training Resources offers online training material for cybersecurity specialists, covering technical areas such as artefact handling and analysis.

Andrew Case's personal page for research, software projects, and speaking events

A comprehensive guide to using Metasploit, including searching for modules, specifying exploits and payloads, and using auxiliary modules.

A set of PHP scripts for practicing LFI, RFI, and CMD injection vulnerabilities.

A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved