AWS-Logo_White-Color
Home
Self Guided Setup
1. AWS Account Setup
2. AWS Credit Request
1.
Introduction
1.2
Trend Micro Cloud One
1.3
Application Security 101
1.4
TREND MICRO CLOUD ONE™ –APPLICATION SECURITY
1.4.1
Gaining Insight
1.4.2
Managing Policy and priority
2.
Prerequisites
3.
Getting Started
3.1
Deploy Jump-box
4.
Vulnerable Container Application
4.1
Configuring Security Policy
4.2
SQL Injection
4.3
Remote Command Execution Attack
4.4
Illegal FIle Access
5.
Vulnerable Lambda
5.1
Configuring Security Policy
5.2
Malicious File Upload
5.3
Command Injection
5.4
Illegal File Access
6.
Reporting
7.
Clean Up Resources
7.1
AMAZON ECS CLEANUP
7.2
Lambda Cleanup
8.
Conclusion
9.
Survey
AWS Builders Library
Modernization with AWS
Trend Micro - Cloud One Trial
AWS Marketplace
DevOps Resource Center
Youtube - Application Security
Self Guided Lab
Privacy
|
Site Terms
| © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Building Modern Applications with Security Embedded - DevSecOps
>
Clean Up Resources
> Lambda Cleanup
Vulnerable Serverless Application Cleanup
1. Open your AWS management console and
log in
.
The stack takes a few minutes to delete the resources.
Lambda Cleanup
Vulnerable Serverless Application Cleanup
1. Open your AWS management console and
log in
.
Navigate to
CloudFormation
Select our
Deployed Stack
Select
Delete
The stack takes a few minutes to delete the resources.