Part 3: Cloud Forensic Analysis – Responding to an Incident in the Cloud
In this part, we take one step forward in debunking the complexities of forensically acquiring cloud artifacts, including memory and disk artifacts, understanding network logs, and obtaining them for offline analysis and investigation. We will also look at fundamental forensic artifacts and their importance in investigations. This section will investigate containers hosted in the cloud, along with cloud productivity suites.
This part has the following chapters:
- Chapter 8, The Digital Forensics and Incident Response Process
- Chapter 9, Common Attack Vectors and TTPs
- Chapter 10, Cloud Evidence Acquisition
- Chapter 11, Analyzing Compromised Containers
- Chapter 12, Analyzing Compromised Cloud Productivity Suites