AWS-Logo_White-Color
Home
1
AWS Hosted Event Setup
1.1
Access Your Temporary AWS Account
1.2
Access Lacework
2
Lacework Cloud Security for your AWS Environments
2.1
Lacework Global Dashboard
2.2
Lacework Global Search
2.3
AWS Compliance
2.4
Container and Host Vulnerabilities
2.5
Resources
2.6
Policies
2.7
Alert Channels and Rules
3
Seamless Multi-Account Security: Lacework with AWS Control Tower
3.1
How It Works
3.2
Lacework Control Tower Integration Setup
3.3
Generate a Lacework API Access Key
3.4
Launch the AWS CloudFormation Template
3.5
Validate the Setup
4
Advanced Cloud Security Posture Management (CSPM+)
4.1
Anatomy of the Attack
4.2
Cloud Security Compliance
4.3
Lacework Security Events
4.4
The Lacework Polygraph
5
Vulnerability & Workload Protection (DevSecOps) with CodePipeline, CodeBuild, ECR & EKS
5.1
Architecture
5.2
Lacework, CodePipeline, CodeBuild, ECR & EKS in CloudFormation
5.3
CodePipeline: A DevSecOps Pipeline
5.4
CodeBuild: Build, Scan & Push
5.5
Lacework Container Security: Image and Registry Scanning
5.6
CodeBuild: Deploy to EKS
5.7
Execute the Pipeline
5.8
View Security Results in Lacework
6
Vulnerability & Workload Protection (DevSecOps) with CodePipeline, CodeBuild, ECR & ECS
6.1
Architecture
6.2
Lacework, CodePipeline, CodeBuild, ECR & ECS in CloudFormation
6.3
CodePipeline: A DevSecOps Pipeline
6.4
CodeBuild: Build, Scan & Push
6.5
Lacework Container Security: Image and Registry Scanning
6.6
CodeBuild: Deploy to ECS
6.7
Execute the Pipeline
6.8
View Security Results in Lacework
7
SIEM: AWS Security Hub and Lacework
Survey
Cleanup
GitHub repo
Resources
Schedule
© 2020 Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Immersion Day with Lacework
>
AWS Hosted Event Setup
> Access Lacework
Access Lacework
Check for your Lacework invitation email.
Click on the
JOIN NOW
button to be taken to Lacework.
Accept the terms.
Welcome to Lacework!