Remove sand-honey-building-honeypots
article thumbnail

Sand & Honey: Building Honeypots

Lacework

Mark Manning (@antitree ) – Security Architect at Snowflake Jared Stroud (@DLL_Cool_J) – Cloud Security Researcher Takeaways Honeypot data collection can be achieved via mandatory access control/sandbox technology. Attack surface of API endpoints can be collected without building a honeypot per-API.