AWS-Logo_White-Color
Home
Event Engine Setup
1. AWS Event Engine
1.
Introduction
1.2
Trend Micro Cloud One
1.3
Application Security 101
1.4
TREND MICRO CLOUD ONE™ –APPLICATION SECURITY
1.4.1
Gaining Insight
1.4.2
Managing Policy and priority
2.
Prerequisites
3.
Getting Started
3.1
Deploy Jump-box
4.
Vulnerable Container Application
4.1
Configuring Security Policy
4.2
SQL Injection
4.3
Remote Command Execution Attack
4.4
Illegal FIle Access
5.
Vulnerable Lambda
5.1
Configuring Security Policy
5.2
Malicious File Upload
5.3
Command Injection
5.4
Illegal File Access
6.
Reporting
8.
Conclusion
9.
Survey
AWS Builders Library
Modernization with AWS
Trend Micro - Cloud One Trial
AWS Marketplace
DevOps Resource Center
Youtube - Application Security
Self Guided Lab
Event Engine
Privacy
|
Site Terms
| © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Building Modern Applications with Security Embedded - DevSecOps
>
Vulnerable Container Application
> Configuring Security Policy
Protect your application with Application Security
1. Open the Trend Micro Cloud One console and
log in
.
2. Select the Application Security tile.
3. Select the
AWS-WORKSHOP-FARGATE
security group created previously and edit the policy.
4. Open your AWS management console and
log in
.
5. Create a fake user and log in with the user created
Configuring Security Policy
Protect your application with Application Security
1. Open the Trend Micro Cloud One console and
log in
.
2. Select the Application Security tile.
3. Select the
AWS-WORKSHOP-FARGATE
security group created previously and edit the policy.
Ensure all modules are
ENABLED
Ensure all modules are in
REPORT
mode.
Save
4. Open your AWS management console and
log in
.
Navigate to
Amazon ECS
Select our created
Cluster
Select
Tasks
Tab
Select your
Task ID
to obtain the
Public IP address
Using our
Jump-Box
RDP session, in a FireFox browser paste the IP address and port:
your.ip.address:8000
5. Create a fake user and log in with the user created
Example:
Username:
aws-workshop
Password:
L3tsL3arn
Now let’s start the attacks tests 💻 🚀