Service D&R Identity D&R Environment VMs, Containers, Kubernetes Cloud Services & Control Plane IDP (IAM, Okta, etc) Data Sources eBPF, K8s Audit, System Logs, Network Logs Cloudtrail, GCP Audit Logs, Azure Activity Logs, S3/Data logs, Flow logs IAM Logs Okta Logs Detection Examples Reverse Shell Crypto Miner Started Sensitive File Read Console Login without MFA Account Takeover Command Executed in Unused Region Okta Employee Impersonated Account Deactivate MFA Personas SOC, CSIRT, DART, Detection Engineering, SecOps 16