How Amazon Security Lake is helping customers simplify security data management for proactive threat analysis
In this post, we explore how Amazon Web Services (AWS) customers can use Amazon Security Lake to efficiently collect, query, and centralize logs on AWS. We also discuss new use cases for Security Lake, such as applying generative AI to Security Lake data for threat hunting and incident response, and we share the latest service enhancements and developments from our growing landscape. Security Lake centralizes security data from AWS environments, software as a service (SaaS) providers, and on-premises and cloud sources into a purpose-built data lake that is stored in your AWS account. Using Open Cybersecurity Schema Framework (OCSF) support, Security Lake normalizes and combines security data from AWS and a broad range of third-party data sources. This helps provide your security team with the ability to investigate and respond to security events and analyze possible threats within your environment, which can facilitate timely responses and help to improve your security across multicloud and hybrid environments.
<p>One year ago, AWS embarked on a mission driven by the growing customer need to revolutionize how security professionals centralize, optimize, normalize, and analyze their security data. As we celebrate the one-year general availability milestone of <a href="https://aws.amazon.com/security-lake/" target="_blank" rel="noopener">Amazon Security Lake</a>, we’re excited to reflect on the journey and showcase how customers are using the service, yielding both productivity and cost benefits, while maintaining ownership of their data.</p>
<p>Figure 1 shows how Security Lake works, step by step. For more details, see <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/what-is-security-lake.html" target="_blank" rel="noopener">What is Amazon Security Lake?</a></p>
<div id="attachment_34082" class="wp-caption aligncenter">
<img aria-describedby="caption-attachment-34082" src="https://infracom.com.sg/wp-content/uploads/2024/05/img1.png" alt="Figure 1: How Security Lake works" width="780" class="size-full wp-image-34082">
<p id="caption-attachment-34082" class="wp-caption-text">Figure 1: How Security Lake works</p>
</div>
<h2>Customer use cases</h2>
<p>In this section, we highlight how some of our customers have found the most value with Security Lake and how you can use Security Lake in your organization.</p>
<h3>Simplify the centralization of security data management across hybrid environments to enhance security analytics</h3>
<p>Many customers use Security Lake to gather and analyze security data from various sources, including AWS, multicloud, and on-premises systems. By centralizing this data in a single location, organizations can streamline data collection and analysis, help eliminate data silos, and improve cross-environment analysis. This enhanced visibility and efficiency allows security teams to respond more effectively to security events. With Security Lake, customers simplify data gathering and reduce the burden of data retention and <a href="https://aws.amazon.com/what-is/etl/" target="_blank" rel="noopener">extract, transform, and load (ETL)</a> processes with key AWS data sources.</p>
<p>For example, Interpublic Group (IPG), an advertising company, uses Security Lake to gain a comprehensive, organization-wide grasp of their security posture across hybrid environments. <a href="https://www.youtube.com/watch?v=qcXB6Y_7bNo" target="_blank" rel="noopener">Watch this video from re:Inforce 2023</a> to understand how IPG streamlined their security operations.</p>
<p>Before adopting Security Lake, the IPG team had to work through the challenge of managing diverse log data sources. This involved translating and transforming the data, as well as reconciling complex elements like IP addresses. However, with the implementation of Security Lake, IPG was able to access previously unavailable log sources. This enabled them to consolidate and effectively analyze security-related data. The use of Security Lake has empowered IPG to gain comprehensive insight into their security landscape, resulting in a significant improvement in their overall security posture.</p>
<table width="100%">
<tbody>
<tr>
<td width="100%"> <p>“We can achieve a more complete, organization-wide understanding of our security posture across hybrid environments. We could quickly create a security data lake that centralized security-related data from AWS and third-party sources,” — <strong>Troy Wilkinson</strong>, <em>Global CISO at Interpublic Group</em></p></td>
</tr>
</tbody>
</table>
<h3>Streamline incident investigation and reduce mean time to respond</h3>
<p>As organizations expand their cloud presence, they need to gather information from diverse sources. Security Lake automates the centralization of security data from AWS environments and third-party logging sources, including firewall logs, storage security, and threat intelligence signals. This removes the need for custom, one-off security consolidation pipelines. The centralized data in Security Lake streamlines security investigations, making security management and investigations simpler. Whether you’re in operations or a security analyst, dealing with multiple applications and scattered data can be tough. Security Lake makes it simpler by centralizing the data, reducing the need for scattered systems. Plus, with data stored in your <a href="https://aws.amazon.com/s3/" target="_blank" rel="noopener">Amazon Simple Storage Service (Amazon S3)</a> account, Security Lake lets you store a lot of historical data, which helps when looking back for patterns or anomalies indicative of security issues.</p>
<p>For example, SEEK, an Australian online employment marketplace, uses Security Lake to streamline incident investigations and reduce mean time to respond (MTTR). <a href="https://www.youtube.com/watch?v=g5uIrAod910" target="_blank" rel="noopener">Watch this video from re:Invent 2023</a> to understand how SEEK improved its incident response. Prior to using Security Lake, SEEK had to rely on a legacy VPC Flow Logs system to identify possible indicators of compromise, which took a long time. With Security Lake, the company was able to more quickly identify a host in one of their accounts that was communicating with a malicious IP. Now, Security Lake has provided SEEK with swift access to comprehensive data across diverse environments, facilitating forensic investigations and enabling them scale their security operations better.</p>
<h3>Optimize your log retention strategy</h3>
<p>Security Lake simplifies data management for customers who need to store large volumes of security logs to meet compliance requirements. It provides customizable retention settings and automated storage tiering to optimize storage costs and security analytics. It automatically partitions and converts incoming security data into a storage and query-efficient Apache Parquet format. Security Lake uses the Apache Iceberg open table format to enhance query performance for your security analytics. Customers can now choose which logs to keep for compliance reasons, which logs to send to their analytics solutions for further analysis, and which logs to query in place for incident investigation use cases. Security Lake helps customers to retain logs that were previously unfeasible to store and to extend storage beyond their typical retention policy, within their security information and event management (SIEM) system.</p>
<p>Figure 2 shows a section of the Security Lake activation page, which presents users with options to set <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/manage-regions.html" target="_blank" rel="noopener">rollup AWS Regions</a> and storage classes.</p>
<div id="attachment_34083" class="wp-caption aligncenter">
<img aria-describedby="caption-attachment-34083" loading="lazy" src="https://infracom.com.sg/wp-content/uploads/2024/05/img2.png" alt="Figure 2: Security Lake activation page with options to select a roll-up Region and set storage classes" width="754" height="519" class="size-full wp-image-34083">
<p id="caption-attachment-34083" class="wp-caption-text">Figure 2: Security Lake activation page with options to select a roll-up Region and set storage classes</p>
</div>
<p>For example, Carrier, an intelligent climate and energy solutions company, relies on Security Lake to strengthen its security and governance practices. By using Security Lake, Carrier can adhere to compliance with industry standards and regulations, safeguarding its operations and optimizing its log retention.</p>
<table width="100%">
<tbody>
<tr>
<td width="100%"> <p>“Amazon Security Lake simplifies the process of ingesting and analyzing all our security-related log and findings data into a single data lake, strengthening our enterprise-level security and governance practices. This streamlined approach has enhanced our ability to identify and address potential issues within our environment more effectively, enabling us to proactively implement mitigations based on insights derived from the service,” — <strong>Justin McDowell</strong>, <em>Associate Director for Enterprise Cloud Services at Carrier</em></p></td>
</tr>
</tbody>
</table>
<h3>Proactive threat and vulnerability detection</h3>
<p>Security Lake helps customers identify potential threats and vulnerabilities earlier in the development process by facilitating the correlation of security events across different data sources, allowing security analysts to identify complex attack patterns more effectively. This proactive approach shifts the responsibility for maintaining secure coding and infrastructure to earlier phases, enhancing overall security posture. Security Lake can also optimize security operations by automating safeguard protocols and involving engineering teams in decision-making, validation, and remediation processes. Also, by seamlessly integrating with security orchestration tools, Security Lake can help expedite responses to security incidents and preemptively help mitigate vulnerabilities before exploitation occurs.</p>
<p>For example, SPH Media, a Singapore media company, uses Security Lake to get better visibility into security activity across their organization, enabling proactive identification of potential threats and vulnerabilities.</p>
<h3>Security Lake and generative AI for threat hunting and incident response practices</h3>
<p>Centralizing security-related data allows organizations to efficiently analyze behaviors from systems and users across their environments, providing deeper insight into potential risks. With Security Lake, customers can centralize their security logs and have them stored in a standardized format using OCSF. OCSF implements a well-documented schema maintained at <a href="http://schema.ocsf.io" target="_blank" rel="noopener">schema.ocsf.io</a>, which generative AI can use to contextualize the structured data within Security Lake tables. Security personnel can then <a href="https://aws.amazon.com/blogs/security/generate-ai-powered-insights-for-amazon-security-lake-using-amazon-sagemaker-studio-and-amazon-bedrock/" target="_blank" rel="noopener">ask questions of the data using familiar security investigation terminology</a> rather than needing data analytics skills to translate an otherwise simple question into complex SQL (Structured Query Language) queries. Building upon the previous processes, <a href="https://aws.amazon.com/bedrock/" rel="noopener" target="_blank">Amazon Bedrock</a> then takes an organization’s natural language incident response playbooks and converts them into a sequence of queries capable of automating what would otherwise be manual investigation tasks.</p>
<table width="100%">
<tbody>
<tr>
<td width="100%"> <p>“Organizations can benefit from using Amazon Security Lake to centralize and manage security data with the OCSF and Apache Parquet format. It simplifies the integration of disparate security log sources and findings, reducing complexity and cost. By applying generative AI to Security Lake data, SecOps can streamline security investigations, facilitate timely responses, and enhance their overall security,” — <strong>Phil Bues</strong>, <em>Research Manager, Cloud Security at IDC</em></p></td>
</tr>
</tbody>
</table>
<h3>Enhance incident response workflow with contextual alerts</h3>
<p>Incident responders commonly deal with a high volume of automatically generated alerts from their IT environment. Initially, the response team members sift through numerous log sources to uncover relevant details about affected resources and the causes of alerts, which adds time to the remediation process. This manual process also consumes valuable analyst time, particularly if the alert turns out to be a false positive.</p>
<p>To reduce this burden on incident responders, customers can use generative AI to perform initial investigations and generate human-readable context from alerts<a href="https://aws.amazon.com/quicksight/q/" target="_blank" rel="noopener">. Amazon Q in QuickSight</a> is a generative AI–powered assistant that can answer questions, provide summaries, generate content, and securely complete tasks based on data and information in your enterprise systems. Incident responders can now combine these capabilities with data in Amazon Security Lake to begin their investigation and build detailed dashboards in minutes. This allows them to visually identify resources and activities that could potentially trigger alerts, giving incident responders a head start in their response efforts. The approach can also be used to validate alert information against alternative sources, enabling faster identification of false positives and allowing responders to focus on genuine security incidents.</p>
<p>As natural language processing (NLP) models evolve they can also interpret incident response playbooks, often written in a human-readable, step-by-step format. Amazon Q Apps will enable the incident responder to use natural language to quickly and securely build their own generative AI playbooks to automate their tasks. This automation can streamline incident response tasks such as creating tickets in the relevant ticketing system, logging bugs in the version control system that hosts application code, and tagging resources as non-compliant if they fail to adhere to the organization’s IT security policy.</p>
<h3>Incident investigation with automatic dashboard generation</h3>
<p>By using Amazon Q in QuickSight and data in Security Lake, incident responders can now generate customized visuals based on the specific characteristics and context of the incident they are investigating. The incident response team can start with a generic investigative question and automatically produce dashboards without writing SQL queries or learning the complexities of how to build a dashboard.</p>
<p>After building a topic in Amazon Q in QuickSight. The investigator can either ask their own question or utilize the AI generated questions that Q has provided. In the example shown in Figure 3, the incident responder suspects a potential security incident and is seeking more information about Create or Update API calls in their environment, by asking “I’m looking for what accounts ran an update or create api call in the last week, can you display the API Operation?”</p>
<div id="attachment_34084" class="wp-caption aligncenter">
<img aria-describedby="caption-attachment-34084" src="https://infracom.com.sg/wp-content/uploads/2024/05/img3.png" alt="Figure 3: AI Generated visual to begin the investigation" width="780" class="size-full wp-image-34084">
<p id="caption-attachment-34084" class="wp-caption-text">Figure 3: AI Generated visual to begin the investigation</p>
</div>
<p>This automatically generated dashboard can be saved for later and from this dashboard the investigator can just focus on one account with a simple right click and get more information about the API calls performed by a single account. as shown in Figure 4.</p>
<div id="attachment_34085" class="wp-caption aligncenter">
<img aria-describedby="caption-attachment-34085" src="https://infracom.com.sg/wp-content/uploads/2024/05/img4.png" alt="Figure 4: Investigating API calls for a single account" width="780" class="size-full wp-image-34085">
<p id="caption-attachment-34085" class="wp-caption-text">Figure 4: Investigating API calls for a single account</p>
</div>
<p>Using the centralized security data in Amazon Security Lake and Amazon Q in QuickSight, incident responders can jump-start investigations and rapidly validate potential threats without having to write complex queries or manually construct dashboards.</p>
<h2>Updates since GA launch</h2>
<p>Security Lake makes it simpler to analyze security data, gain a more comprehensive understanding of security across your entire organization, and improve the protection of your workloads, applications, and data. Since the general availability release in 2023, we have made various updates to the service. It’s now available in <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/supported-regions.html" target="_blank" rel="noopener">17 AWS Regions globally</a>. To assist you in evaluating your current and future Security Lake usage and cost estimates, we’ve introduced a new usage page. If you’re currently in a 15-day free trial, your trial usage can serve as a reference for estimating post-trial costs. Accessing Security Lake usage and projected costs is as simple as logging into the <a href="https://console.aws.amazon.com/securitylake/" target="_blank" rel="noopener">Security Lake console</a>.</p>
<p>We have released an integration with <a href="https://aws.amazon.com/detective/" target="_blank" rel="noopener">Amazon Detective</a> that enables <a href="https://docs.aws.amazon.com/detective/latest/userguide/securitylake-integration.html" target="_blank" rel="noopener">querying and retrieving logs stored in Security Lake</a>. Detective begins pulling raw logs from Security Lake related to <a href="https://aws.amazon.com/cloudtrail/" target="_blank" rel="noopener">AWS CloudTrail</a> management events and <a href="https://docs.aws.amazon.com/vpc/latest/userguide/flow-logs.html" target="_blank" rel="noopener">Amazon VPC Flow Logs</a>. Security Lake enhances analytics performance with support for <a href="https://aws.amazon.com/about-aws/whats-new/2024/02/amazon-security-lake-analytics-ocsf-iceberg/" target="_blank" rel="noopener">OCSF 1.1.0 and Apache Iceberg</a>. Also, Security Lake has integrated several OCSF mapping enhancements, including OCSF <a href="https://schema.ocsf.io/1.1.0/objects/observable" target="_blank" rel="noopener">Observables</a>, and has adopted the latest version of the OCSF datetime profile for improved usability. Security Lake seamlessly centralizes and normalizes <a href="https://aws.amazon.com/about-aws/whats-new/2024/02/amazon-security-lake-audit-logs-eks/" target="_blank" rel="noopener">Amazon Elastic Kubernetes Service (Amazon EKS) audit logs</a>, simplifying monitoring and investigation of potential suspicious activities in your Amazon EKS clusters, without requiring additional setup or affecting existing configurations.</p>
<h2>Developments in Partner integrations</h2>
<p>Over 100 sources of data are available in Security Lake from AWS and third-party sources. Customers can ingest logs into Security Lake directly from their sources. Security findings from over 50 partners are available through <a href="https://aws.amazon.com/security-hub/" target="_blank" rel="noopener">AWS Security Hub</a>, and software as a service (SaaS) application logs from popular platforms such as Salesforce, Slack, and Smartsheet can be sent into Security Lake through <a href="https://aws.amazon.com/appfabric/" target="_blank" rel="noopener">AWS AppFabric</a>. <a id="_Hlk164800001" target="_blank" rel="noopener">Since the GA launch, Security Lake has added 18 partner integrations, and we now offer over 70 direct partner integrations. New source integrations include </a><a href="https://www.boschaishield.com/aishield-and-aws/" target="_blank" rel="noopener">AIShield by Bosch</a>, <a href="https://docs.contrastsecurity.com/en/aws-security-lake.html" target="_blank" rel="noopener">Contrast Security</a>, <a href="https://databahn.ai/blogs/navigating-the-new-security-data-frontier-the-synergy-of-databahn-ai-aws-security-lake-and-ocsf/" target="_blank" rel="noopener">DataBahn</a>, <a href="https://www.monad.com/blog/advancing-security-data-management-with-aws-security-lake" target="_blank" rel="noopener">Monad</a>, <a href="https://community.sailpoint.com/t5/IdentityNow-Wiki/SailPoint-IdentityNow-AuditEvent-Integration-for-Amazon-Security/ta-p/241725" target="_blank" rel="noopener">SailPoint</a>, <a href="https://sysdig.com/integrations/amazon-security-lake/" target="_blank" rel="noopener">Sysdig</a>, and <a href="https://talon-sec.com/blog/news/talon-cyber-security-integrates-with-amazon-security-lake-and-joins-aws-isv-accelerate-program/" target="_blank" rel="noopener">Talon</a>. New subscribers who have built integrations include <a href="https://cloud-fastener.com/en/#securityLake" target="_blank" rel="noopener">Cyber Security Cloud</a>, <a href="https://docs.devo.com/space/latest/324337730/Amazon+Security+Lake+collector" target="_blank" rel="noopener">Devo</a>, <a href="https://www.elastic.co/blog/amazon-security-lake-elastic-security-integration" target="_blank" rel="noopener">Elastic</a>, <a href="https://xsoar.pan.dev/docs/reference/integrations/aws-security-lake" target="_blank" rel="noopener">Palo Alto Networks</a>, <a href="https://panther.com/blog/panther-now-integrates-with-aws-security-lake-embracing-the-open-cybersecurity-schema-framework-ocsf/" target="_blank" rel="noopener">Panther</a>, <a href="https://www.query.ai/resources/blogs/query-announces-support-for-amazon-security-lake/" target="_blank" rel="noopener">Query.AI</a>, <a href="https://www.securonix.com/blog/securonix-unlocks-cyber-resiliency-with-amazon-security-lake/" target="_blank" rel="noopener">Securonix</a>, and <a href="https://www.tegocyber.com/blog/unlocking-security-efficiency-celebrating-one-year-of-amazon-security-lake" target="_blank" rel="noopener">Tego Cyber</a> and new service partner offerings from <a href="https://aws.amazon.com/blogs/apn/how-accenture-accelerates-building-a-secure-cloud-foundation-natively-on-aws/" target="_blank" rel="noopener">Accenture</a>, <a href="https://mantelgroup.com.au/blog/an-introduction-to-security-lake/" target="_blank" rel="noopener">CMD Solutions, part of Mantel Group</a>, <a href="https://aws.amazon.com/blogs/apn/generative-ai-augments-marriott-cybersecurity-posture-with-aws-partners-deloitte-and-palo-alto-networks/" target="_blank" rel="noopener">Deloitte</a>, <a href="https://eviden.com/insights/press-releases/eviden-launches-aisaac-cyber-mesh-strengthened-by-aws-for-reinforced-cyber-resilience/" target="_blank" rel="noopener">Eviden</a>, <a href="https://aws.amazon.com/marketplace/pp/prodview-5dm5aecyvpn2i" target="_blank" rel="noopener">HOOP Cyber</a>, <a href="https://www.kyndryl.com/gb/en/about-us/news/2023/06/cyber-threat-intelligence-platform-with-aws" target="_blank" rel="noopener">Kyndryl</a>, <a href="https://modernciso.com/2024/04/30/embracing-the-future-with-amazon-security-lake-why-it-matters/" target="_blank" rel="noopener">Kudelski Security</a>, <a href="https://blogs.infosys.com/emerging-technology-solutions/datanext/using-aws-amazon-web-services-security-lake-as-a-consumer-of-security-logs.html" target="_blank" rel="noopener">Infosys</a>, <a href="https://aws.amazon.com/blogs/apn/how-leidos-standardized-its-application-logging-into-amazon-security-lake-with-lois/" target="_blank" rel="noopener">Leidos</a>, <a href="https://www.megazone.com/us/techblog_asl_240429/" target="_blank" rel="noopener">Megazone</a>, <a href="https://www.pwc.com/us/en/technology/alliances/amazon-web-services/fusion-center.html" target="_blank" rel="noopener">PwC</a> and <a href="https://www.wipro.com/newsroom/press-releases/2023/wipro-launches-continuous-compliance-solution-built-on-amazon-security-lake/" target="_blank" rel="noopener">Wipro</a>.</p>
<h2>Developments in the Open Cybersecurity Schema Framework</h2>
<p>The OCSF community has grown over the last year to almost 200 participants across security-focused independent software vendors (ISVs), government agencies, educational institutions, and enterprises. Leading cybersecurity organizations have contributed to the OCSF schema, such as Tanium and Cisco Duo. Many existing Security Lake partners are adding support for OCSF version 1.1, including <a href="https://www.confluent.io/blog/stream-security-data-to-amazon-security-lake/" target="_blank" rel="noopener">Confluent</a>, <a href="https://cribl.io/blog/when-stream-meets-lake-cribl-integrates-with-new-amazon-security-lake/" target="_blank" rel="noopener">Cribl</a>, <a href="https://www.cyberark.com/resources/identity-security/cyberark-audit-delivers-security-event-information-to-amazon-security-lake" target="_blank" rel="noopener">CyberArk</a>, <a href="https://databahn.ai/blogs/navigating-the-new-security-data-frontier-the-synergy-of-databahn-ai-aws-security-lake-and-ocsf/" target="_blank" rel="noopener">DataBahn</a>, <a href="https://www.datadoghq.com/resources/amazon-security-lake-solution-brief/" target="_blank" rel="noopener">Datadog</a>, <a href="https://www.elastic.co/blog/amazon-security-lake-elastic-security-integration" target="_blank" rel="noopener">Elastic</a>, <a href="https://community.ibm.com/community/user/security/blogs/olga-hout/2023/03/12/ibm-security-qradar-and-amazon-security-lake" target="_blank" rel="noopener">IBM</a>, <a href="https://www.netskope.com/resources/solution-briefs/netskope-and-amazon-security-lake" target="_blank" rel="noopener">Netskope</a>, <a href="https://orca.security/resources/blog/amazon-security-lake-orca-security/" target="_blank" rel="noopener">Orca Security</a>, <a href="https://www.paloaltonetworks.com/blog/prisma-cloud/amazon-security-lake/" target="_blank" rel="noopener">Palo Alto Networks</a>, <a href="https://panther.com/blog/panther-now-integrates-with-aws-security-lake-embracing-the-open-cybersecurity-schema-framework-ocsf/" target="_blank" rel="noopener">Panther</a>, <a href="https://ripjar.com/blog/ripjar-announces-integration-with-amazon-security-lake/" target="_blank" rel="noopener">Ripjar</a>, <a href="https://www.securonix.com/blog/securonix-unlocks-cyber-resiliency-with-amazon-security-lake/" target="_blank" rel="noopener">Securonix</a>, <a href="https://www.sentinelone.com/blog/sentinelone-integrates-with-amazon-security-lake-to-power-cloud-investigations/" target="_blank" rel="noopener">SentinelOne</a>, <a href="https://socprime.com/blog/soc-primes-integration-highlights-with-amazon-security-lake/" target="_blank" rel="noopener">SOC Prime</a>, <a href="https://www.sumologic.com/press-release/sumo-logic-accelerates-data-insights-to-modernize-security-operations/" target="_blank" rel="noopener">Sumo Logic</a>, <a href="https://www.splunk.com/en_us/form/aws-security-lake-brief.html" target="_blank" rel="noopener">Splunk</a>, <a href="https://site.tanium.com/Amazon-Security-Lake-Solution-Brief.html" target="_blank" rel="noopener">Tanium</a>, <a href="https://www.tegocyber.com/blog/unlocking-security-efficiency-celebrating-one-year-of-amazon-security-lake" target="_blank" rel="noopener">Tego Cyber</a>, <a href="https://torq.io/blog/secops-pipelines-aws/" target="_blank" rel="noopener">Torq</a>, <a href="https://www.trellix.com/en-us/blogs/xdr/trellix-leverages-amazon-security-lake.html" target="_blank" rel="noopener">Trellix</a>, <a href="https://stellarcyber.ai/news/press-releases/stellar-cyber-announces-support-for-amazon-security-lake-to-speed-data-processing-and-threat-detection-2/" target="_blank" rel="noopener">Stellar Cyber</a>, <a href="https://www.query.ai/resources/blogs/query-announces-support-for-amazon-security-lake/" target="_blank" rel="noopener">Query.AI</a>, <a href="https://swimlane.com/swimlane-aws-accelerate-incident-response-security-automation/" target="_blank" rel="noopener">Swimlane</a>, and more. Members of the OCSF community who want to validate their OCSF schema for Security Lake have access to a validation script on <a href="https://github.com/aws-samples/amazon-security-lake-ocsf-validation" target="_blank" rel="noopener">GitHub</a>.</p>
<h2>Get help from AWS Professional Services</h2>
<p>The global team of experts in the <a href="https://aws.amazon.com/professional-services/" target="_blank" rel="noopener">AWS Professional Services</a> organization can help customers realize their desired business outcomes with AWS. Our teams of data architects and security engineers collaborate with customer security, IT, and business leaders to develop enterprise solutions. </p>
<p>The AWS ProServe Amazon Security Lake Assessment offering is a complimentary workshop for customers. It entails a two-week interactive assessment, delving deep into customer use cases and creating a program roadmap to implement Security Lake alongside a suite of analytics solutions. Through a series of technical and strategic discussions, the AWS ProServe team analyzes use cases for data storage, security, search, visualization, analytics, AI/ML, and generative AI. The team then recommends a target future state architecture to achieve the customer’s security operations goals. At the end of the workshop, customers receive a draft architecture and implementation plan, along with infrastructure cost estimates, training, and other technical recommendations.</p>
<h2>Summary</h2>
<p>In this post, we showcased how customers use Security Lake to collect, query, and centralize logs on AWS. We discussed new applications for Security Lake and generative AI for threat hunting and incident response. We invite you to discover the benefits of using Security Lake through our <a href="https://aws.amazon.com/security-lake/pricing/?refid=9bc21f40-12f4-4d2b-8b8d-6f6f65ab19e6" target="_blank" rel="noopener">15-day free trial</a> and share your feedback. To help you in getting started and building your first security data lake, we offer a range of resources including an <a href="https://d1.awsstatic.com/Security/Amazon%20Security%20Lake%20Infographic.pdf" target="_blank" rel="noopener">infographic</a>, <a href="https://d1.awsstatic.com/Security/Amazon%20Security%20Lake%20eBook.pdf" target="_blank" rel="noopener">eBook</a>, <a href="https://www.youtube.com/watch?v=j6IxULE7_4k&list=PLhr1KZpdzukfNUc0k0c61EuC2WK-4ATwz" target="_blank" rel="noopener">demo videos</a>, and <a href="https://www.youtube.com/watch?v=g5uIrAod910" target="_blank" rel="noopener">webinars</a>. There are many different use cases for Security Lake that can be tailored to suit your AWS environment. Join us at <a href="https://reinforce.awsevents.com/" target="_blank" rel="noopener">AWS re:Inforce 2024</a>, our annual cloud security event, for more insights and firsthand experiences of how Security Lake can help you centralize, normalize, and optimize your security data.</p>
<p> <br>If you have feedback about this post, submit comments in the<strong> Comments</strong> section below. If you have questions about this post, <a href="https://console.aws.amazon.com/support/home" target="_blank" rel="noopener noreferrer">contact AWS Support</a>.</p>
<p><strong>Want more AWS Security news? Follow us on <a title="Twitter" href="https://twitter.com/AWSsecurityinfo" target="_blank" rel="noopener noreferrer">X</a>.</strong></p>
<!-- '"` -->