Back to articles
Use Suricata as An Intrusion Detection System on AWS
How-ToTools

Use Suricata as An Intrusion Detection System on AWS

via Dev.tofosres

This is Part 3 of a series. I highly recommend reading the first two posts in order before starting this one: 1️⃣ Secure AWS Lab Setup for Security Engineers: IAM Identity Center + SSM + Zero Open Ports Learn how to set up AWS IAM Identity Center, SSM Session Manager, and a zero-open-ports EC2 instance. This post assumes you have completed this setup. 2️⃣ Fish Shell Functions for Managing AWS EC2 Instances — Save Time and Billing Learn how to use fish shell functions ( lab-create , lab-connect , lab-snapshot , lab-restore , etc.) to manage your EC2 lab efficiently. The commands in this post assume you have these functions installed. ⚠️ Your instance IP changes every session. Every time you run lab-restore or lab-create a new EC2 instance is launched with a different private IP address. Before running any commands in this post that reference an IP address (curl tests, nmap, suricata.yaml HOME_NET ), always check your current IP first: ip addr show enX0 | grep "inet " Replace 172.31.23.1

Continue reading on Dev.to

Opens in a new tab

Read Full Article
8 views

Related Articles