workshop, you will simulate the unauthorized use of IAM credentials using a script invoked within AWS CloudShell. The script will perform reconnaissance and privilege escalation activities that have been commonly seen by the AWS CIRT (Customer Incident Response Team) and are typically performed during similar events of this nature. You will then be introduced to some of the tools and processes that the AWS CIRT use, and learn how to use these tools to find evidence of unauthorized activity. Ransomware on S3 - Simulation and Detection During this workshop, you will use a CloudFormation template to replicate an environment with multiple IAM users and five (5) Amazon S3 buckets. AWS CloudShell will then be used to run a bash script that will simulate data exfiltration and data deletion events that replicate a ransomware based security event. You will then be introduced to some of the tools and processes that the AWS CIRT (Customer Incident Response Team) team use in response to similar events, and learn how to use these tools to find evidence of unauthorized activity. Cryptominer Based Security Events - Simulation and Detection During this workshop, you will simulate a cryptomining security event by using a CloudFormation template to initialize five EC2 instances. These five EC2 instances will mimic cryptomining activity by performing DNS requests to known cryptomining domains. You will then be introduced to some of the tools and processes that the AWS CIRT (Customer Incident Response Team) use in response to similar events, and learn how to use these tools to find evidence of unauthorized activity.