Amazon Security Lake resources

Documentation

User Guide 

Explore detailed information and instructions for working with Amazon Security Lake.

HTML | PDF

API Reference

Learn more about the Security Lake API operations and example requests and responses for each operation.

HTML | PDF

Ebook and Infographic

Infographic

Plan Your Amazon Security Lake Journey

Ebook

Democratizing Security Data with Amazon Security Lake and Industry Leaders for Improved Protection

Webinars

Webinar

AWS re:Invent 2024 - Accelerate security analytics across hybrid environments with AWS (SEC235)

Webinar

AWS re:Inforce 2024 - Developing an autonomous framework with Security Lake & Torc Robotics (TDR301)

Webinar

AWS re:Invent 2023 - Streamlining security investigations with Amazon Security Lake (SEC234)

Webinar

AWS re:Inforce 2023 - Build your security data lake with Amazon Security Lake, featuring IPG (TDR205)

Webinar

AWS re:Invent 2022 - [NEW LAUNCH!] Introducing Amazon Security Lake (SEC216)

Blog posts and articles

BLOG POST

Patterns for consuming custom log sources in Amazon Security Lake

Author: Pratima Singh and Chris Lamont-Smith
Published date: 15 JUL 2024
BLOG POST

How Amazon Security Lake is helping customers simplify security data management for proactive threat analysis

Author: Nisha Amthul, Jonathan Garzon, and Ross Warren
Published date: 07 MAY 2024
BLOG POST

How to develop an Amazon Security Lake POC

Author: Anna McAbee, Marc Luescher, and Marshall Jones
Published date: 28 FEB 2024
  • Date

No items returned.

1

Overview videos

Operationalize AWS WAF Web ACL logs with Amazon Security Lake (13:23)
Amazon OpenSearch Ingestion supports Amazon Security Lake event ingestion (14:56)
How to get started and manage Amazon Security Lake with AWS Organizations (7:58)
Amazon Security Lake with Amazon Athena and Amazon QuickSight (11:31)
Setting up a custom source in Amazon Security Lake (8:15)