Investigation Playbook

Read-only Credentials

IAM Principal

Common Vulnerabilities and Exposures (CVE)

Inventory Report

Security Tooling Account

Gap Analysis

Single Sign-On (SSO)

Security Assertion Markup Language (SAML)

Confused Deputy Problem

Security Posture

Break Glass User

Local Individual User

Prompt Incident Response

Policy as Code

Virtual Security Appliance

Forensic Logging

Message Replay

Forward Secrecy

DDoS Attack Layers: An Overview with Examples