Feb. 28, 2024, 2:25 p.m. | Anna McAbee

AWS Security Blog aws.amazon.com

You can use Amazon Security Lake to simplify log data collection and retention for Amazon Web Services (AWS) and non-AWS data sources. To make sure that you get the most out of your implementation requires proper planning. In this post, we will show you how to plan and implement a proof of concept (POC) for […]

amazon amazon security lake amazon web services aws aws incident response aws-security can cloud security collection compliance data data collection data sources identity implementation incident response intermediate (200) log log data logging monitoring non planning poc proof retention security security blog services simplify technical how-to web web services

More from aws.amazon.com / AWS Security Blog

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Sr. Staff Firmware Engineer – Networking & Firewall

@ Axiado | Bengaluru, India

Compliance Architect / Product Security Sr. Engineer/Expert (f/m/d)

@ SAP | Walldorf, DE, 69190

SAP Security Administrator

@ FARO Technologies | EMEA-Portugal