<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>AWS Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/tag/aws/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/tag/aws</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Thu, 22 Apr 2021 10:08:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>AWS Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/tag/aws</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Webinar Takeaway: How to build a security observability strategy in AWS</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-build-a-security-observability-strategy-in-aws</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-build-a-security-observability-strategy-in-aws#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 22 Apr 2021 10:08:56 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[cloud security]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=429</guid>

					<description><![CDATA[<p>My key takeaways AWS CloudTrail: think of a master switch for the stack MTTR³ = Mean time to respond, resolve and recovery metrics giving valuable insights also for cloud security Possible steps in an automation playbook collect and aggregate event data determine anomalous behaviour and events determine appropriate response action build triggers to kick of [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-build-a-security-observability-strategy-in-aws">Webinar Takeaway: How to build a security observability strategy in AWS</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-build-a-security-observability-strategy-in-aws/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
