{"version":"1.0","provider_name":"Qubit Academy","provider_url":"https:\/\/qubitacademy.com\/sk\/","title":"AWS Security Hub - Qubit Academy","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"I6UYsRWFWF\"><a href=\"https:\/\/qubitacademy.com\/sk\/aws-security-hub\/\">AWS Security Hub<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/qubitacademy.com\/sk\/aws-security-hub\/embed\/#?secret=I6UYsRWFWF\" width=\"600\" height=\"338\" title=\"&#8220;AWS Security Hub&#8221; &#8212; Qubit Academy\" data-secret=\"I6UYsRWFWF\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/qubitacademy.com\/wp-content\/uploads\/2020\/08\/aws_cloud_1600x500.jpg","thumbnail_width":1600,"thumbnail_height":500,"description":"AWS Security Hub&nbsp; Kontakt Denisa Lavkov\u00e1+421 948 959 957 Bezpe\u010dnos\u0165&nbsp;inform\u00e1cii&nbsp;a&nbsp;informa\u010dn\u00e9ho&nbsp;syst\u00e9mu&nbsp;je&nbsp;dnes&nbsp;jednou&nbsp;z&nbsp;najd\u00f4le\u017eitej\u0161\u00edch&nbsp;t\u00e9m.&nbsp;Pred&nbsp;navrhnut\u00edm&nbsp;ak\u00e9hoko\u013evek&nbsp;IS by&nbsp;mali&nbsp;by\u0165&nbsp;zaveden\u00e9&nbsp;z\u00e1kladn\u00e9&nbsp;bezpe\u010dnostn\u00e9&nbsp;postupy. S&nbsp;platnos\u0165ou&nbsp;GDPR je zabezpe\u010denie&nbsp;a&nbsp;ochrana&nbsp;va\u0161ich&nbsp;a&nbsp;z\u00e1kazn\u00edckych&nbsp;d\u00e1t&nbsp;d\u00f4le\u017eitou&nbsp;s\u00fa\u010das\u0165ou&nbsp;ka\u017ed\u00e9ho&nbsp;podnikania&nbsp;on-premise&nbsp;aj&nbsp;v&nbsp;cloude.&nbsp; Na&nbsp;tomto&nbsp;semin\u00e1ri&nbsp;sa&nbsp;HeleCloud&nbsp;podel\u00ed&nbsp;o&nbsp;svoje&nbsp;odborn\u00e9&nbsp;znalosti&nbsp;a&nbsp;predstav\u00ed,&nbsp;ako&nbsp;si&nbsp;m\u00f4\u017eete&nbsp;zaisti\u0165&nbsp;svoje&nbsp;d\u00e1ta&nbsp;ulo\u017een\u00e9&nbsp;v AWS&nbsp;pomocou&nbsp;bezpe\u010dnostn\u00fdch&nbsp;n\u00e1strojov,&nbsp;ktor\u00e9&nbsp;poskytuje&nbsp;dod\u00e1vate\u013e, a&nbsp;dodr\u017eiavan\u00edm&nbsp;osved\u010den\u00fdch&nbsp;postupov&nbsp;zabezpe\u010denia&nbsp;AWS.&nbsp; Uvid\u00edte,&nbsp;ako&nbsp;pou\u017e\u00edva\u0165&nbsp;a&nbsp;kombinova\u0165&nbsp;bezpe\u010dnostn\u00e9&nbsp;n\u00e1stroje&nbsp;AWS&nbsp;ako&nbsp;s\u00fa:&nbsp; Prieskum&nbsp;&#8211;&nbsp;aktivita&nbsp;upozor\u0148uj\u00faca&nbsp;na&nbsp;mo\u017en\u00fd&nbsp;prieskum&nbsp;\u00fato\u010dn\u00edkom,&nbsp;napr\u00edklad&nbsp;neobvykl\u00e1&nbsp;aktivita&nbsp;API,&nbsp;skenovanie&nbsp;portov,&nbsp;ne\u00faspe\u0161n\u00e9&nbsp;prihl\u00e1senia,&nbsp;zis\u0165ovanie&nbsp;portov&nbsp;zo&nbsp;zn\u00e1mej&nbsp;\u0161kodlivej&nbsp;adresy&nbsp;IP.&nbsp; Kompromit\u00e1cia&nbsp;in\u0161tancie&nbsp;&#8211;&nbsp;aktivita&nbsp;upozor\u0148uj\u00faca&nbsp;na&nbsp;kompromit\u00e1ciu&nbsp;in\u0161tancie,&nbsp;ako&nbsp;je&nbsp;napr\u00edklad&nbsp;\u0165a\u017eenie&nbsp;kryptomeny, command and control (C&amp;C),&nbsp;odmietnutie&nbsp;slu\u017eby,&nbsp;neobvykle&nbsp;vysok\u00fd&nbsp;objem&nbsp;prenosu&nbsp;d\u00e1t&nbsp;po&nbsp;sieti.&nbsp; Kompromit\u00e1cia&nbsp;\u00fa\u010dtu&nbsp;&#8211;&nbsp;be\u017en\u00e9&nbsp;vzorce&nbsp;ako&nbsp;volania&nbsp;API z&nbsp;nezvy\u010dajnej&nbsp;in\u0161tancie&nbsp;alebo&nbsp;spustenia&nbsp;infra\u0161trukt\u00fary,&nbsp;nasadenie&nbsp;infra\u0161trukt\u00fary&nbsp;v&nbsp;nezvy\u010dajnej&nbsp;oblasti&nbsp;a&nbsp;volania&nbsp;API zo&nbsp;zn\u00e1mych&nbsp;\u0161kodliv\u00fdch&nbsp;adries&nbsp;IP.&nbsp; \u010co&nbsp;sa&nbsp;nau\u010d\u00edte&nbsp; Po\u010das&nbsp;tohto&nbsp;jednod\u0148ov\u00e9ho&nbsp;workshopu&nbsp;o&nbsp;bezpe\u010dnosti&nbsp;d\u00e1t&nbsp;v AWS &hellip;"}