☁️
CTHFM: AWS
search
⌘Ctrlk
☁️
CTHFM: AWS
  • hand-waveWelcome
  • Getting Started
    • Account Setup
  • AWS CLI
    • AWS CLI Overview
    • Installation
  • AWS Fundamentals
    • AWS Documentation
    • AWS Shared Responsibility Model
    • Organizational Hierarchy
    • AWS Principals
    • IAM Fundamentals
    • AWS Security Services Overview
    • AWS Core Services
    • AWS Frameworks
    • Regions and Availability Zones
  • SQL
    • SQL Refresher for Threat Hunting
  • Logging Reference
    • Cloudtrail
    • VPCFlow Logs
    • GuardDuty
    • Access Analyzer
      • Setup
      • External Access and Unused Access Analyzer Findings
      • Review Findings
      • Access Analyzer Resources
      • Access Analyzer API Reference
    • AWS Network Firewall
    • AWS Config
  • CloudWatch
    • Amazon CloudWatch
  • Athena For Threat Hunting
    • Introduction to Athena
    • Setting Up Athena
    • SQL For Threat Hunters
    • Automated Response
    • Query Best Practices
  • AWS Security Research and Resources
    • AWS Security Blog
    • AWS Goat
    • Cloud Goat
    • Pacu
    • Prowler
    • Scout Suite
  • Threat Hunting in AWS
    • Threat Hunting in AWS
    • Threat Hunting Introduction
    • Threat Hunting Process
    • Pyramid of Pain
    • MITRE Att&ck
    • MITRE Att&ck: AWS
    • AWS Threat Hunting Ideas
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Logging Reference

Access Analyzer

Setupchevron-rightExternal Access and Unused Access Analyzer Findingschevron-rightReview Findingschevron-rightAccess Analyzer Resourceschevron-rightAccess Analyzer API Referencechevron-right
PreviousGuardDuty Quotaschevron-leftNextSetupchevron-right