How to use generative AI & Amazon Security Lake for threat analysis | AWS OnAir-S05

AWS Events
14 Jun 202420:33

Summary

TLDRビデオスクリプトでは、セキュリティ・レイク(Security Lake)の紹介とその価値提案が行われています。Mark TeranとRoss Warrenが、AWSのセキュリティ問題を事前に特定し、解決するプロセスを説明しています。彼らはセキュリティ分析者の時間をデータの集約に費やすのではなく、自動化された方法でS3バケットにデータを一元化し、パートナーツールを通じて分析を可能にしています。さらに、オープンサイバーセキュリティスキーマフレームワーク(OCSF)を使用してデータを統一し、顧客がより迅速かつコスト効率の高い方法でセキュリティ状況を把握できるようにしています。

Takeaways

  • 😀 セキュリティレイク(Security Lake)は、セキュリティデータを民主化することを目指しており、顧客が保護できないものを見える化するためのツールです。
  • 🔍 セキュリティレイクは、顧客がセキュリティアナリストの時間をデータの整理に費やすのを避けるために作られました。顧客は情報分析は得意ですが、情報を一元化するのが難しく、セキュリティレイクはこれを自動化します。
  • 📦 セキュリティレイクはS3バケットにデータを一元化し、顧客がデータをコントロールし、必要なパートナーやツールにデータを提供することができます。
  • 🔗 ソースとサブスクライバーという概念があります。ソースはAWS上で自動生成されるもので、サブスクライバーは分析ワークロードを指しており、複数の第三者ツールやサービスが含まれます。
  • 🛠️ セキュリティレイクはオープンサイバーセキュリティスキーマフレームワーク(OCSF)を使用して、さまざまなデータソースからデータを統一された形式に変換します。
  • 📈 顧客はSQLクエリを理解しており、セキュリティレイクはこれを使用してデータに問い合わせを行い、結果を返します。
  • 👨‍🏫 セキュリティの基礎知識を身に着けるためには、AWSの様々なトレーニングや認定資格を取得することが推奨されています。
  • 🚀 セキュリティレイクは過去1年で多くのソースやパートナー、統合を追加し、顧客のニーズに応えています。
  • 📊 QuickSightやAthenaなどのツールを使用して、セキュリティレイクのデータを視覚化し、ダッシュボードを作成することができます。
  • 🤖 AIを活用して、セキュリティデータに対して自然言語で問い合わせを行い、視覚化されたレポートや分析を迅速に生成することができます。
  • 🔑 セキュリティレイクはセキュリティデータの整理と分析を簡素化し、セキュリティ専門家だけでなく、一般の開発者や経営者にも利用しやすくなっています。

Q & A

  • セキュリティレイクとはどのようなサービスですか?

    -セキュリティレイクは、セキュリティデータを民主化することを目指したサービスで、顧客が大量のログデータを整理し、解析し、表面に持ち上げるのを支援します。

  • Mark TeranとRoss Warrenはどのような人物ですか?

    -Mark TeranはセキュリティレイクのGMであり、Amazon Detectiveに重点を置いて顧客のセキュリティ問題を事前に解決するのに役立ちます。Ross Warrenはセキュリティレイクチームの製品マネージャーで、Markと10〜11年間一緒に働いています。

  • セキュリティレイクの価値提案とは何ですか?

    -セキュリティレイクの価値提案は、顧客がS3バケットにデータを一元管理し、パートナーやツールにデータを提供することで、セキュリティ分析者がデータの集約と分析に時間を費やすのを助けることです。

  • セキュリティレイクのソースとサブスクライバーとは何を意味していますか?

    -ソースはAWS上で自動生成されるもので、ワークロードを含みます。サブスクライバーは主に分析ワークロードで、OpenSearchやAthena、SageMakerなどのツールを含みます。

  • セキュリティレイクが提供するオープンサイバーセキュリティフレームワーク(OCSF)とは何ですか?

    -OCSFは、インダストリーの助けを借りて作成されたデータのスキーマで、受信データの形式を統一化し、顧客がより効率的にデータを照会できるようにします。

  • セキュリティの専門家ではない初心者がセキュリティレイクを使い始めるにはどうしたら良いですか?

    -初心者はAWSの基礎知識やセキュリティの基本概念を学び、セキュリティレイクのハンズオンワークショップやAWS Skill Builderの学習パスを活用して始めることができます。

  • セキュリティログがセキュリティ体制になぜ重要なのか説明してください。

    -セキュリティログは、システムのアクティビティ、APIコール、リソース間の相互作用を記録しており、顧客がセキュリティ上のリスクや脆弱性を特定するために不可欠な情報源です。

  • セキュリティレイクが提供するデータの正規化とは何を意味していますか?

    -データの正規化とは、異なるソースからのログデータを一つの標準形式に変換することで、顧客がデータの分析や問い合わせを容易に行うことができるようにするプロセスです。

  • セキュリティレイクのデモンストレーションで使用されたクイックサイトとは何ですか?

    -クイックサイトは、セキュリティレイクのデータを視覚化するためのダッシュボードツールで、顧客がデータを簡単に分析し、レポートを作成できるように設計されています。

  • セキュリティレイクが提供するAIツール「クロード」とは何ですか?

    -クロードは、セキュリティレイクのデータに対して自然言語で質問し、視覚化やレポートを作成するためのAIツールで、専門知識がなくてもデータの分析を迅速に行うことができます。

  • セキュリティレイクのデモンストレーションで生成されたレポートはどのようにして改善されるか教えてください。

    -レポートは、より具体的な質問や指示をAIツールに与えることで改善され、より詳細なデータの分析や視覚化を提供することができます。

Outlines

00:00

😀 セキュリティレイクの紹介と価値提案

ビデオスクリプトの第1段落では、Mark Teran ZonyとRoss Warrenがセキュリティレイクについて紹介しています。MarkはセキュリティレイクのGMとして、顧客のセキュリティ問題を事前に解決することを目指していると述べています。Rossは製品マネージャーとして、Markと共に10年以上働き、セキュリティの専門知識を提供しています。彼らはセキュリティデータを民主化し、顧客が保護できないものを保護できないという問題に対処することを目的としています。セキュリティ分析者がデータの整理に時間を費やす問題を解決するために、S3バケットにデータを一元化し、顧客がデータをコントロールできるようにしています。また、ソースとサブスクライバーの概念も紹介されています。

05:00

📚 セキュリティの基礎知識とセキュリティレイクの使い方

第2段落では、セキュリティの基本知識とセキュリティレイクの使い方について説明されています。ログがセキュリティポジションに重要な役割を果たしている理由や、AWSセキュリティの基礎を学ぶ方法について触れられています。Kyleがセキュリティレイクの使いやすさを強調しており、ログを有効にし始めることで、データの正規化を容易に行うことができます。また、セキュリティの専門知識を持つ人たちが、セキュリティレイクを活用してデータの分析や可視化を行う方法も紹介されています。

10:01

🖥️ セキュリティデータの分析と可視化

第3段落では、セキュリティデータの分析と可視化について詳しく説明されています。Rossはクイックサイトを使用してデータセットを分析し、視覚化する方法をデモンストレーションしています。彼はセキュリティレイクのデータセットを活用し、質問を通じてデータにアクセスし、分析結果を可視化しています。また、クイックサイトのダッシュボードを作成し、データの分析を通じてセキュリティの状況を把握する方法についても触れられています。

15:02

📈 レポート作成の効率化とAIの活用

第4段落では、セキュリティの状況を週次レポートとして提供する必要がある状況を例に、AIの活用によるレポート作成の効率化について紹介されています。Rossは、AIツール「クロード」を使用して、セキュリティ状況を分析し、レポートを作成する方法を説明しています。このプロセスは、セキュリティ分析者にとって非常に時間の節約であり、セキュリティの状況を迅速かつ効果的に把握することができると強調されています。

20:03

🙌 セキュリティレイクの成功と今後の展望

最後の段落では、MarkとRossがセキュリティレイクの成功と今後の展望について話しています。セキュリティレイクが1年以上も存在しており、顧客のセキュリティデータを民主化し、分析を容易にすることを目的として成長を続けていることが強調されています。彼らは今後もセキュリティレイクを通じて、顧客のセキュリティ問題を解決し、セキュリティ分析をさらに強化していく意図を示しています。

Mindmap

Keywords

💡セキュリティレイク (Security Lake)

セキュリティレイクは、AWS(アマゾンウェブサービス)のセキュリティデータを一元化し、分析しやすくするサービスです。ビデオのテーマはセキュリティデータの可視化と分析であり、セキュリティレイクはそのプロセスを簡素化し、顧客がセキュリティ上のリスクを迅速に特定し、対処できるように支援しています。例として、ビデオ内でセキュリティレイクが提供する中央集権化されたデータの利便性を強調しています。

💡セキュリティアナリスト (Security Analyst)

セキュリティアナリストは、組織のセキュリティを確保するために、データの分析と脅威の特定を担当する専門家です。ビデオでは、セキュリティレイクがアナリストがデータの集約に費やす時間を減らし、より多くの時間を分析に充てることができるようにすることを示しています。

💡データ・_wrangling_ (データ・_wrangling_)

データ・_wrangling_は、データ分析の前段階で行われるデータのクリーニング、整形、および準備を意味します。ビデオでは、セキュリティアナリストがデータ・_wrangling_に費やす時間を減らすことで、セキュリティレイクが分析プロセスの効率を高める方法を紹介しています。

💡S3バケット (S3 Bucket)

S3バケットは、AWSが提供するストレージサービスで、大量のデータを保存することができます。ビデオでは、セキュリティレイクがデータをS3バケットに中央集権化し、顧客がデータをコントロールし、必要なデータを簡単に取り出すことができるようにしている点が強調されています。

💡ソース (Source)

ソースは、セキュリティレイクのコンテキストでは、AWS上で自動的に生成されるものや、ワークロードから取り込まれるものを指します。ビデオでは、ソースがセキュリティレイクによって自動的に取り込まれるデータの種類を表していると説明しています。

💡サブスクライバー (Subscriber)

サブスクライバーは、セキュリティレイクのデータにアクセスし、分析を行うワークロードやツールを指します。ビデオでは、サブスクライバーとしてOpenSearchやAthenaなどのAWSの分析ツール、またはSplunkやDatadogなどの第三者ツールが挙げられています。

💡オープン・サイバーセキュリティ・スキーマ・フレームワーク (Open Cyber Security Schema Framework, OCSF)

OCSFは、セキュリティデータの形式を統一するためのフレームワークで、ビデオ内でセキュリティレイクがデータを標準化し、分析を容易にするための方法として紹介されています。OCSFを使用することで、顧客はセキュリティデータをより一貫した方法で分析できます。

💡SQLクエリ (SQL Query)

SQLクエリは、データベースから情報を取得するために使用される命令のセットです。ビデオでは、セキュリティレイクがSQLクエリを理解し、使用することで、顧客がデータを簡単に照会できるようにしている点に触れています。

💡リスク行動 (Risk Behavior)

リスク行動は、組織のセキュリティに脅威をもたらす可能性のある行動を指します。ビデオでは、セキュリティレイクが顧客に環境内でリスク行動を特定するのを助ける方法について説明しています。

💡データ・ノーマライゼーション (Data Normalization)

データ・ノーマライゼーションは、データの形式や構造を一貫性のあるものに変換するプロセスです。ビデオでは、セキュリティレイクがデータをノーマライズして、顧客が異なるソースからのデータを一つの標準形式で分析できるようにすることが強調されています。

Highlights

Nick's Launchpad is working and the team is discussing how to spend a productive Friday.

Mark Teran, GM of Security Lake, introduces himself and his focus on helping customers address security issues proactively.

Ross Warren, Product Manager at Security Lake, shares his background and a coincidental encounter with Kyle.

The concept of Security Lake is introduced as a means to democratize security data, making it more accessible.

Security analysts spend a lot of time on data wrangling, and Security Lake aims to automate this process.

Security Lake helps centralize and organize data in an S3 bucket, giving customers control over their data.

Sources and subscribers are explained as components of Security Lake, providing a unified view of data from various sources.

Integrations with analytic workloads like OpenSearch, Athena, and third-party tools are discussed as part of Security Lake's offerings.

The Open Cyber Security Schema Framework (OCSF) is highlighted as a way to unify data into a standardized format.

Security Lake's ease of enabling logs and bringing them into a normalized format is emphasized.

The importance of logs in security and their role as the lifeblood of security operations is discussed.

Kyle suggests resources for learning more about AWS security, including live streams, workshops, and AWS Skill Builder.

Ross demonstrates how to build visualizations in QuickSight using Security Lake data without writing SQL queries.

The ability to quickly generate reports and visualizations for security status updates is showcased.

Claude, a foundational model, is used to generate a quick story for creating a security status report.

The discussion concludes with the potential for a deeper dive into creating visualizations using Q and QuickSight on a future live stream.

Transcripts

play00:13

it looks like Nick's Launchpad is

play00:15

working today for once uh hey Ross Mark

play00:20

guys how's it going guys hey guys I have

play00:23

zero complaints I cannot think of a more

play00:25

awesome way to spend a Friday uh while

play00:28

working so um I'm looking outside and it

play00:31

looks nice and warm my wife do you're

play00:33

stuck inside nope someone's pulling

play00:35

around in my garage I should tax them on

play00:38

that so anyway Mark Ross uh first can

play00:42

you explain what security lake is but

play00:44

before that can you explain who you are

play00:46

what you do and why did you want to

play00:48

spend your Friday uh with us today sure

play00:52

I'll go first hi folks Mark Teran Zony

play00:54

I'm the GM of security Lake um as well

play00:56

as Amazon detective really focusing on

play00:58

helping customers um address their

play01:01

security issues before they become

play01:02

bigger

play01:03

problems and uh I'm Ross Warren I'm the

play01:06

product essay on the security Lake team

play01:09

I've been working for Mark for the past

play01:11

10 11 years in different uh sorry

play01:14

Avenues and actually when I first met

play01:16

Kyle he said I know who you are you

play01:19

downloaded one of my white papers years

play01:21

ago so it was a little bit of a weird

play01:24

coincidence um when I first met him at a

play01:26

bar after he joined ads I don't go to

play01:28

bars

play01:30

no he never

play01:32

gra no that's why this beard is so full

play01:35

it's full of

play01:38

secrets I don't know I'm just I'm

play01:40

riffing with it I'm seeing what sticks

play01:42

all right cut me some slack R is a

play01:44

numbers game isn't it Kyle it really is

play01:47

yeah well Ross and mark thank you for

play01:49

joining us uh we're here to talk about

play01:51

security Lake and uh it's been a year so

play01:55

take us back in time a little bit what

play01:57

was it like launching a year ago

play02:00

stressful but um but exciting as it

play02:03

always is uh but let me let me talk a

play02:06

little bit about what security lake is

play02:07

and what the value prop and what's

play02:10

happened over the course of the year so

play02:12

um ultimately at the highest level we

play02:13

want to democratize security data uh

play02:16

customers can't protect what they don't

play02:18

can't see and many of the things they

play02:20

want to see are hitting in lots of logs

play02:22

and large volumes and it's really hard

play02:24

for them to parse that information and

play02:27

bring it to the surface so we help them

play02:28

do that and the journey started really

play02:31

by talking to customers that were

play02:33

spending a lot of their security analyst

play02:36

times basically data wrangling and what

play02:40

they found out is the security elenes

play02:42

are really good at analyzing the

play02:44

information but not really good at

play02:46

pulling it all together and it was a

play02:49

large set of undiff undifferentiated

play02:51

heavy lifting so we wanted to really

play02:53

take that off the table and

play02:55

automatically centralize and organize

play02:58

all the data that they need in one place

play03:00

and that place is in their S3 bucket so

play03:03

they have control over that data and

play03:05

they can and they can vend it out to

play03:07

whatever Partners including some of our

play03:09

Cool Tools to make use of that data and

play03:11

helpfully um try to figure out what's

play03:13

happening in the environment uh that may

play03:16

involve some risky Behavior that's it

play03:18

that's it at the high level when I get a

play03:20

little bit a little deeper into that um

play03:23

we have this notion of sources and

play03:24

subscribers so sources are things that

play03:27

we generate in AWS on work loads that we

play03:30

bring in automatically uh subscribers in

play03:33

that those sources include multiple

play03:36

third parties SAS application logs from

play03:39

on Prem logs from other places that

play03:41

customers run workloads so they have

play03:43

unified centralized View and then the

play03:46

sub subscribers are largely analytic

play03:48

workloads including things that we have

play03:50

such as open search and Athena and Sage

play03:53

maker and uh thirdparty tools like

play03:56

Splunk and data dog and um I M crowd

play04:00

strike and I mean IBM Q radar and crowd

play04:04

strike and palal networks that the

play04:06

customers already use today but want to

play04:09

have a bigger aperture onto the

play04:11

information that they can analyze over

play04:13

time so that's kind of what it looks

play04:15

like and over the course of the year

play04:16

we've added a lot more sources we've

play04:18

added a lot more partners and uh We've

play04:21

added a lot of uh interesting

play04:22

Integrations and the reason this comes

play04:24

together pretty natively uh is and we're

play04:27

going to talk a little bit about some of

play04:28

the you know cannot talk security

play04:30

without some gen and some of the

play04:32

capabilities that brings to the table

play04:33

and Ross is going to give us a nice demo

play04:35

on that a little bit later hopefully but

play04:37

why this is a you know why security Lake

play04:40

makes that a lot easier for customers is

play04:42

twofold one is um the query uh stack is

play04:47

understood and unified right SQL queries

play04:50

we have a language uh we know how to how

play04:52

to write queries in that language and

play04:54

then what we did with with industry's

play04:57

help is we created a schema on this data

play05:00

called open cyber security schema

play05:02

framework or ocsf that now takes the

play05:05

data that's coming in and unifies it

play05:07

into a format so when you have a known

play05:09

set of data and you have a known set of

play05:12

capabilities that you want to query it

play05:14

things like gen can automate that

play05:17

process so what we found in our Journeys

play05:19

with customers is they are really smart

play05:22

from a security perspective and they

play05:24

know how to ask really good questions

play05:25

like things like tell me the top five

play05:30

vulnerabilities in my environment

play05:32

they're accessible to the internet

play05:34

speaking of really good questions Mar

play05:35

let me interrupt you here for just a

play05:37

second we had a really good question

play05:38

from chat um you know I think before we

play05:41

dive fully into I look I'm sitting with

play05:44

three Security Experts I'm a little

play05:47

nervous actually uh you all are gonna

play05:49

start okay two Security Experts sorry I

play05:52

miscounted um uh you know we some of the

play05:56

some of the audience maybe they don't

play05:58

have a security background I'm a Dev

play06:01

right so when I think logs that's where

play06:02

I go to troubleshoot right but security

play06:06

folks y'all live in the logs I've

play06:08

learned uh logs are your lifeblood right

play06:12

can you explain kind of the fundamentals

play06:14

right the question from chat is what do

play06:15

I have to have a basic knowledge of to

play06:17

get into security like but can you

play06:19

explain maybe like why logs are so

play06:21

important to uh security posture compan

play06:24

I'm just going to start calling myself a

play06:25

digital Lumberjack because I deal with

play06:28

logs

play06:30

yeah

play06:32

um go go ahead Kyle you're gonna say

play06:34

something yeah so um so there's awesome

play06:38

ways to learn more about security Lake

play06:40

um but also just the basics of AWS

play06:42

security and there's a handful of ways

play06:43

of doing this uh one you could join

play06:46

these live streams there's also a live

play06:47

stream called lockdown where we focus on

play06:50

security stuff that's on Tuesdays at 11:

play06:52

am Pacific Time who does Lockdown Kyle

play06:54

as your host Kyle um where we talk about

play06:56

various security topics but also for

play07:00

um like immersive experiences there's

play07:02

workshops. AWS and I'll have I'll ask

play07:05

politely that Nick dro the link into the

play07:08

chat for you to reference uh but those

play07:10

are some like self-paced workshops but

play07:12

then there's also AWS skill Builder a

play07:14

more formal training where you could

play07:16

look at the learning Paths of getting

play07:19

your AWS solution architect associate

play07:22

your AWS Cloud fundamentals or

play07:25

foundations it's one of the two um or

play07:27

the security specialty certification

play07:30

so there's multiple ways to go about it

play07:33

depending on what your preferred

play07:34

modality of learning is now if you want

play07:37

to learn more about security Lake if

play07:39

you're at any of the conferences or if

play07:40

there's a AWS Summit uh there's

play07:42

typically Hands-On workshops that are

play07:43

happening around that as well uh but

play07:45

yeah there's tons of resources and we'll

play07:47

try to get those links into the chat and

play07:49

maybe during our sponsor segment I'll

play07:52

pull up some links and drop them in the

play07:53

chat myself so Kyle's very

play07:57

verbose and he wants to make make sure

play07:59

he's got everything out there but to get

play08:02

into security

play08:04

Lake it is actually very very easy for

play08:07

you to start enabling logs and bringing

play08:09

things in that whole normalization that

play08:11

Mark talked about if it's a native log

play08:14

you don't have to think about it you now

play08:15

have logs normalized across your whole

play08:18

organization um where before even I had

play08:21

to go Google how do I do cross account

play08:23

buckets what are my policies what are my

play08:24

rules I've got four or five buttons for

play08:27

to start doing that in security like so

play08:29

it's very very easy um it's now then

play08:32

what you do with the data is sort of now

play08:35

what those Partners or there's those

play08:38

other kinds of solutions that Mark was

play08:39

talking about and that's the uh open

play08:42

source standardized format that you were

play08:45

you were yeah the

play08:47

normalization interrupted you so rudely

play08:49

Mark that that's a component of it um

play08:52

but I think Ross hit the nail in the

play08:54

head getting it all in one place where

play08:55

and customers get to decide if they want

play08:57

to bring it into one region or keep it

play08:59

in the region it's generated but these

play09:01

logs are can be large right they they

play09:04

emulate all of the traffic patterns that

play09:06

the customers run while they're running

play09:08

their applications at awos they're

play09:10

capturing all of the API calls and in

play09:13

the interactions within the resources at

play09:15

the infrastructure layer so there's a

play09:16

lot of data that's in here um and what

play09:19

the beauty of that normalization in some

play09:22

of the capabilities that gen brings is

play09:24

we can start to bring that data back in

play09:27

a pinpointed way so we're not bringing

play09:29

it all back we're not spending a lot of

play09:30

money on processing it all it's at rest

play09:33

and when the customer asks a question uh

play09:36

through one of the partners or our tools

play09:39

um we're just precisely going to the

play09:41

information we need in giving the

play09:42

results back and that saves a lot of

play09:44

time and a lot of money well we're

play09:46

running out of time Ross do you wanna do

play09:48

you want to show us some of this Ross

play09:50

said he had like popup pictures and like

play09:52

a took right I was like that's a great

play09:55

question that someone just asked because

play09:56

now let's go show um how we can do all

play10:00

that yes and very very easily um what

play10:04

we're looking at here is a pretty nice

play10:07

looking dashboard in quick site um and

play10:12

one of my colleagues built it and I've

play10:14

watched him write squel queries it's not

play10:16

fun to watch him write squl queries

play10:18

inside of Q or inside of Athena but he

play10:23

built all this very very easy by asking

play10:26

questions of Q so what we're kind of

play10:28

looking at here is

play10:30

quick site that's got some data sets

play10:32

that are in security Lake all that

play10:34

normalized format everything that Mark

play10:36

was just talking about um so we've got a

play10:39

bunch of cool visualizations here right

play10:41

we've got a nice Landslide coming off

play10:44

there um in some of our data but and

play10:48

I've got other things here we could look

play10:50

at cloud trail we could look at security

play10:52

Hub and we've got a lot of really nice

play10:55

detail but let's figure out how did Matt

play10:57

actually build these things

play11:00

um I can now start I clicked on hey

play11:03

let's ask some questions of my cloud

play11:06

trail

play11:07

data Q is pretty cool because it

play11:09

actually will give me some questions

play11:13

that it already thought about and we

play11:15

could pick uh we're randomly GNA go

play11:18

let's see if this one works fingers

play11:20

crossed all right great that was easy

play11:23

did I write a SQL query Kyle no I know

play11:27

you love writing SQL queries um

play11:29

but now I know that I've got a lot of

play11:31

read activities 1.3 million read

play11:34

activities um what's cool is I can share

play11:37

this Visual and I can then start

play11:40

building other you know adding to that

play11:42

dashboard that I showed you a minute ago

play11:44

that's kind of on the lefthand sides of

play11:46

the screen there um I think someone said

play11:50

about you

play11:51

know let's put something else in there

play11:54

what resources most high level

play11:55

vulnerabilities now fingers crossed

play11:58

again do I get some good

play12:01

data what I'm doing now is really just

play12:04

hey I'm starting to investigate my data

play12:07

um okay we got a whole bunch of

play12:10

resources and my visualization didn't

play12:12

necessarily give me what I wanted but

play12:14

that's fine we can now it's because we

play12:16

didn't do a dance for the demo oh we

play12:19

didn't do a dance you're correct no um

play12:22

but that's one way to start building up

play12:24

some of these visuals but I want to kind

play12:27

of show you guys um

play12:29

a little bit of the back end just a

play12:31

little bit remember I said that um Hugh

play12:36

could actually

play12:37

generate some some questions I've got a

play12:40

whole bunch of that I did not type in

play12:43

looks like a whole bunch of people have

play12:44

been testing them and asking them but

play12:47

you can click on them and um once again

play12:50

randomly

play12:51

chosen um you

play12:56

know that pretty good I now have an

play12:58

account can go if I want to start doing

play13:00

a deeper investigation I could actually

play13:02

just pivot and look more at this account

play13:04

if I wanted to right here what I think

play13:07

is also important to highlight here and

play13:10

because you mentioned logs loggy log

play13:12

logs right um this is almost eliminating

play13:16

the barrier of usage to getting or being

play13:21

able to ask a question to your data and

play13:23

get a response because normally an

play13:25

executive an analyst someone they need

play13:27

to be familiar with the query language

play13:29

whatever the flavor of whatever they're

play13:31

using for their data analytics or

play13:33

ingestion is right it could be

play13:35

proprietary it could be ANC

play13:38

SQL who can remember all of that stuff

play13:41

yeah right and so accelerating that ex I

play13:46

didn't have to write SQL I didn't have

play13:47

to think about it I didn't have to you

play13:49

know even understand that it's a vendor

play13:51

versus an account versus an AWS

play13:55

um you know user wow yeah little bit of

play13:58

trip up there um it's Friday what's even

play14:01

really more cool more cool that can

play14:04

anything be more cool than Kyle no um

play14:07

very few things

play14:09

so that's just visualizations that's

play14:12

really nice into Quick site but what if

play14:15

Mark came to me and said Ross I need a

play14:17

weekly report of what our security

play14:19

status looks like and I need it in 10

play14:22

minutes hopefully You' you knew that you

play14:24

had to do that report it's always like

play14:26

it's always like hey you busy I need a

play14:28

report right now

play14:29

right immediately he knows I've asked

play14:31

that before no never this isn't a real

play14:34

example right Ross made this up and so

play14:38

just to tie it all together I actually

play14:40

asked Claude to say I need to I need to

play14:44

create a dashboard give me a story now

play14:46

real quick Claude Claude is a

play14:49

foundational model uh that is ji stuff

play14:52

it's not a person Ross didn't track

play14:54

someone down and say hey Claude can you

play14:56

make this Claude is a foundational model

play14:58

yeah

play15:00

so I asked Claude to give me a actually

play15:02

a quick site story to be able to build

play15:04

something and so it I pasted in here I'm

play15:07

not going to read it at the sock manager

play15:09

I need to provide a weekly report and it

play15:11

kind of gave me I need security

play15:13

incidents thread intelligence compliance

play15:15

status right I didn't edit this I really

play15:18

just cut and paste this out of my friend

play15:20

Claude 3 um and I can go now remember I

play15:24

was building up those dashboards that I

play15:26

had before or those visuals I can now

play15:29

utilize some of

play15:31

these and they may not be the proper

play15:34

ones but we're going to throw a whole

play15:36

bunch of them in

play15:38

there and we'll take a look what's going

play15:41

on this is completely random and list

play15:44

one looks nice I found that when working

play15:47

with like chat Bots or anything that's

play15:49

AI related talk to it like a three Ager

play15:52

like you know when I found that I'm

play15:54

talking to chatbots and like geni in a

play15:58

very similar manner that I talked to my

play15:59

three-year-old very specific more

play16:01

detailed instruction gets you the more

play16:03

detailed responses and narrows the scope

play16:06

of the data that can be returned and

play16:09

plus the retrieval augmented generation

play16:10

I mean we could go on and on about gen

play16:13

workloads but what you're essentially

play16:15

saying is hey the security manager that

play16:19

just walked by as I was about to head it

play16:20

to lunch said I need a report with this

play16:23

information this information this

play16:24

information and that information by the

play16:27

way I need it sparkly chart

play16:30

CH in lines and stuff and I only failed

play16:33

because I didn't start over I didn't

play16:34

follow the exact instructions so what

play16:37

this is now doing I said I want these

play16:40

visuals and I have that story that I

play16:42

need to build and we should and very

play16:47

easily now have a PowerPoint

play16:49

presentation and Kyle will say o and a

play16:52

when we get

play16:55

there

play16:57

story we don't have the rights that Kyle

play16:59

don't sing too much um it always comes

play17:02

up with funky names too um some of the

play17:05

other tests I've been doing um but as it

play17:09

generates maybe I picked way too many

play17:11

visuals yeah well while this is

play17:14

generating yeah you know let let's talk

play17:16

about where this all consolidate you

play17:18

know we started with Mark telling us

play17:20

about security L way to consolidate all

play17:23

of these these disparate logs coming

play17:25

from all these the systems into one

play17:27

place and that's how you even get to the

play17:29

point where you start building

play17:30

visualization so uh we we we we kind of

play17:35

launched across security Lake into the

play17:39

getting value from security Lake portion

play17:41

uh but we wouldn't even be able to be

play17:44

generating these visuals without

play17:46

security Lake behind it where you've

play17:47

stored all of your security logs from

play17:50

all the different tools you're using and

play17:52

now Ross you're generating these these

play17:55

uh visuals that you're going to share

play17:56

with your Executives to give them

play17:58

insight into it's been going on

play18:01

generating a summary for you too I know

play18:03

it even gives me a summary um it didn't

play18:07

populate some of them just because I

play18:09

didn't I was randomly picking but um I

play18:13

mean for you to just so nice I can

play18:14

actually bring these in select

play18:16

everything and you're doing this in like

play18:17

the matter of 10 minutes is still really

play18:20

cool you know I would edit it some I

play18:23

know what Mark wants usually and so I

play18:25

would edit it a little bit but I'm using

play18:28

he didn't have to know queries he didn't

play18:30

have he just asked like normal questions

play18:33

and that data you know represented these

play18:36

uh these reports it's awesome I know for

play18:38

a fact with my familiarity of quick site

play18:42

and quering security like this would

play18:44

take me at least half hour to an hour at

play18:47

a minimum to even pick what theme I

play18:50

wanted to use for the

play18:53

conversation and then no this I I know

play18:56

for a fact this would save so much time

play18:59

um for you know those that need to

play19:01

generate reports for like security

play19:03

weekly reviews or you know this is

play19:06

really awesome investigate or threat

play19:09

hunt or do any of these cool things that

play19:10

the security folks do on a daily basis

play19:13

yeah well hey you know what

play19:15

unfortunately we're out of time but chat

play19:16

if you want me to try to convince Mark

play19:18

and Ross to maybe do a deeper dive that

play19:21

might be like 30 minutes to 45 minutes

play19:24

long let me know let me know in the chat

play19:27

I'll see if I could drag them along on

play19:28

the lockdown and we'll talk more about

play19:30

how we could create visualizations using

play19:32

q and quick site uh we do have one

play19:34

question does it become better over time

play19:37

at generating

play19:39

reports that I don't know but we'll find

play19:42

an answer and probably talk about it on

play19:44

lockdown yeah so more coming there's a

play19:47

lot more work about what I just did

play19:49

there's a whole team building some more

play19:51

stuff and so yeah I think yeah where

play19:54

Ross is the face there is a big team

play19:56

behind him creating a lot of cool stuff

play19:59

which is really but I have a big face

play20:00

already so wait a minute I didn't say

play20:02

creting a big that's why it's a big

play20:06

team oh my gosh someone get Mark and

play20:09

Ross out of here I'm kidding Mark Ross

play20:12

thank you so much for joining us I I'm

play20:14

really excited to hear more about uh

play20:16

security Lake and the success it's had

play20:18

and also it's been around for a little

play20:20

over a year now I've heard which is cool

play20:23

thanks for having us guys R has it

play20:25

absolutely take care see you next time

Rate This

5.0 / 5 (0 votes)

Related Tags
セキュリティデータ分析AWSログ管理デモンストレーションサイバーセキュリティセキュリティツールデータ可視化セキュリティ戦略AWSサービス
Do you need a summary in English?