homepage
Open menu
Contact Sales
Go one level top
  • Train and Certify
    Free Course Demos

    Free course demos allow you to see course content, watch world-class instructors in action, and evaluate course difficulty.

    Train and Certify
    Immediately apply the skills and techniques learned in SANS courses, ranges, and summits
    Learn More
    • Overview
    • Courses
      • Overview
      • Full Course List
      • By Focus Areas
        • Cloud Security
        • Cyber Defense
        • Cybersecurity and IT Essentials
        • DFIR
        • Industrial Control Systems
        • Offensive Operations
        • Management, Legal, and Audit
      • By Skill Levels
        • New to Cyber
        • Essentials
        • Advanced
        • Expert
      • Training Formats
        • OnDemand
        • In-Person
        • Live Online
      • Free Course Demos
    • Training Roadmaps
      • Skills Roadmap
      • Focus Area Job Roles
        • Cyber Defense Job Roles
        • Offensive Operations Job Roles
        • DFIR Job Roles
        • Cloud Job Roles
        • ICS Job Roles
        • Leadership Job Roles
      • NICE Framework
        • Security Provisionals
        • Operate and Maintain
        • Oversee and Govern
        • Protect and Defend
        • Analyze
        • Collect and Operate
        • Investigate
        • Industrial Control Systems
      • European Skills Framework
    • GIAC Certifications
    • Training Events & Summits
      • Events Overview
      • In-Person Event Locations
        • Asia
        • Australia & New Zealand
        • Latin America
        • Mainland Europe
        • Middle East & Africa
        • Scandinavia
        • United Kingdom & Ireland
        • United States & Canada
      • Live Online Events List
      • Summits
    • OnDemand
    • Get Started in Cyber
      • Overview
      • Degree and Certificate Programs
      • Scholarships
      • Free Training & Resources
    • Cyber Ranges
  • Enterprise Solutions
    New Cyber Trends & Training in 2023

    This eBook offers a glimpse into the key threats that are expected to emerge as forecasted by SANS experts.

    Enterprise Solutions

    Build a world-class cyber team with our workforce development programs.

    Learn More
    • Overview
    • Group Purchasing
    • Build Your Team
      • Assessments
      • Private Training
      • By Industry
        • Health Care
        • Industrial Control Systems Security
        • Military
    • Leadership Training
      • Leadership Courses
      • Executive Cybersecurity Exercises
  • Security Awareness
    2023 Security Awareness Report

    Empowering Security Awareness teams with industry benchmarking, program growth, and career development.

    Security Awareness
    Increase your staff’s cyber awareness, help them change their behaviors, and reduce your organizational risk
    Learn More
    • Overview
    • Products & Services
      • Security Awareness Training
        • EndUser Training
        • Phishing Platform
      • Specialized
        • Developer Training
        • ICS Engineer Training
        • NERC CIP Training
        • IT Administrator
      • Risk Assessments
        • Knowledge Assessment
        • Culture Assessment
        • Behavioral Risk Assessment
    • OUCH! Newsletter
    • Career Development
      • Overview
      • Training & Courses
      • Professional Credential
    • Blog
    • Partners
    • Reports & Case Studies
  • Resources
    Security Policy Templates

    In collaboration with security subject-matter experts, SANS has developed a set of security policy templates for your use.

    Resources
    Enhance your skills with access to thousands of free resources, 150+ instructor-developed tools, and the latest cybersecurity news and analysis
    Browse Here
    • Overview
    • Webcasts
      • Webinars
      • Live Streams
        • Wait Just An Infosec
        • Cybersecurity Leadership
        • SANS Threat Analysis Rundown (STAR)
    • Free Cybersecurity Events
      • Free Events Overview
      • Summits
      • Solutions Forums
      • Community Nights
    • Content
      • Newsletters
        • NewsBites
        • @RISK
        • OUCH! Newsletter
      • Blog
      • Podcasts
        • Blueprint
        • Trust Me, I'm Certified
        • Cloud Ace
        • Wait Just an Infosec
      • Summit Presentations
      • Posters & Cheat Sheets
    • Internet Storm Center
    • Research
      • White Papers
      • Security Policies
    • Tools
    • Focus Areas
      • Cyber Defense
      • Cloud Security
      • Digital Forensics & Incident Response
      • Industrial Control Systems
      • Cyber Security Leadership
      • Offensive Operations
      • Open-Source Intelligence (OSINT)
  • Get Involved
    Join the Community

    Membership of the SANS.org Community grants you access to cutting edge cyber security news, training, and free tools that can't be found elsewhere.

    Get Involved
    Help keep the cyber community one step ahead of threats. Join the SANS community or begin your journey of becoming a SANS Certified Instructor today.
    Learn More
    • Overview
    • Join the Community
    • Work Study
    • Teach for SANS
    • CISO Network
    • Partnerships
    • Sponsorship Opportunities
  • About
    Our Mission

    To empower current and future cybersecurity practitioners around the world with immediately useful knowledge and capabilities, we deliver industry-leading community programs, resources and training.

    About
    Learn more about how SANS empowers and educates current and future cybersecurity practitioners with knowledge and skills
    Learn More
    • SANS
      • Overview
      • Our Founder
      • Awards
    • Instructors
      • Our Instructors
      • Full Instructor List
    • Mission
      • Our Mission
      • Diversity
      • Scholarships
    • Contact
      • Contact Customer Service
      • Contact Sales
      • Press & Media Enquiries
    • Frequent Asked Questions
    • Customer Reviews
    • Press
    • Careers
  • SANS Sites
    • Australia
    • Brazil
    • France
    • India
    • Japan
    • Middle East & Africa
    • Singapore
    • United Kingdom
  • Log In
  • Join
    • Account Dashboard
    • Log Out
  • Contact Sales
  1. Home >
  2. Blog >
  3. Ransomware in the Cloud
Megan_Roddie_370x370.png
Megan Roddie-Fonseca

Ransomware in the Cloud

Learn about the evolution of ransomware into cloud environments, and how to defend against and prepare for attacks.

July 5, 2023

On a recent episode of Wait Just an Infosec, Ryan Chapman and I discussed the concept of ransomware and cyber extortion in the cloud. This blog post provides insights on the topic based on our discussion. Specifically, we’ll discuss what exactly ransomware in the cloud looks like, the common tactics, techniques, and procedures (TTPs) seen in ransomware attacks in the cloud, and recommendations on how you can be prepared to handle ransomware incidents in cloud environments.

Defining “Ransomware in the Cloud”

Part of the challenge when discussing this topic is the implication of the term “ransomware.” The creation of this term was originally based on the idea of “ransom software,” but as we’ll see when we discuss the TTPs in ransomware attacks, often we don’t see the same concept of executable software being used to carry out the attack. When we think of traditional ransomware attacks, we think of malicious software resulting in widespread encryption of files on systems. This is not exactly what you will see when observing so-called “ransomware activity” in cloud environments. Instead, you’ll likely see what could better be described as an extortion campaign. This is not necessarily surprising when we consider the trend of ransomware in general.

At the onset of ransomware campaigns, we saw the concept of a threat actor encrypting files in a victim environment and demanding a ransom in exchange for the decryption key associated with these files. Over time we saw such campaigns evolve. Potentially to combat organizations who had backups or capabilities to break weak encryption methods, threat actors began what were coined “double-extortion” campaigns. In these types of attacks, not only does the threat actor encrypt the data, but they also exfiltrate data prior to encryption. This provided them with extra leverage in ransom negotiations as even if the victim was able to recover files, the threat actor still had the threat of being able to release private data to the public if not paid. Interestingly, this year we’ve observed further evolution of this tactic. The ransomware group BianLian was observed to have dropped their encryption efforts and focused solely on extortion. To learn more about BianLian’s extortion campaigns, check out the following articles:

  • http://for528.com/bianlian
  • http://for528.com/bianlian2
  • http://for528.com/bianlian3

When we talk about ransomware in the cloud, we are going to observe this most recent type of behavior. Due to the nature of the cloud, there is not the same capability to get a user to run a piece of software and encrypt data stored in the cloud environment. Instead, threat actors are more easily able to exfiltrate data that has not been properly secured, delete the original files, and request a ransom in exchange for the return of the files. In this case, if the organization doesn’t have back ups, paying the ransom may be the only way of getting the data back, as the files are no longer in the environment, not even in an encrypted format. Additionally, even if back ups are present, the threat actors still have the ability to threaten the release of any stolen data, putting the victim organization in a serious predicament. In summary, when we discuss “ransomware” in the cloud, we are not talking about TTPs involving the encryption of data on victim endpoints, but rather a sole focus on stealing and holding data hostage in exchange for a ransom.

One brief topic worth mentioning that is adjacent to ransomware in the cloud is initial access brokers (IABs). IABs are threat actors who compromise an environment, but instead of carrying out an action on objective, they sell this access on the dark web to other threat actors. Ransomware actors have been observed leveraging IABs for quick access to environments where they wish to execute ransomware. It would not be surprising to see IABs begin to dip their toes into the cloud landscape by finding vulnerable environments, gaining access, and offering the access in the same way on the dark web. It’s a possible trend that will be interesting to monitor and may play a role in the progression of ransomware campaigns in the cloud.

Tactics, Techniques, and Procedures (TTPs) of Cloud Ransomware

As mentioned before, what a ransomware attack in the cloud looks like is very different from what we’ve traditionally seen in ransomware attacks in on-premise environments. First, the action on objective is more focused on data exfiltration over the historical trend of data encryption. Furthermore, the execution of malicious software in the environment to carry out the attack is no longer applicable when speaking about the cloud.

A recent blog post by Invictus Incident Response provides a prime example of a real life “ransomware in the cloud” attack and how the threat actor carried out their objectives: https://for528.com/cloud-ransom. This specific attack took place in an AWS environment, but similar steps could be leveraged in the same way via other cloud providers. There are some key components to the attack that give insight into the TTPs we will likely continue to observe in these cloud extortion campaigns.

First, the threat actor must obtain access to the environment. In the case observed by Invictus Incident Response, this was done via exposed credentials. In general, compromised credentials are going to be one of the primary methods of access. This may be through API keys, service accounts, or a regular user account. However they are exposed, the threat actor needs to find credentials with the correct permissions to be able to exfiltrate data or leverage privilege escalation techniques to obtain the permissions.

After obtaining the correct permissions required to carry out their attack, the threat actor will then perform reconnaissance in the environment to identify the data they will exfiltrate and use to ransom the victim. All major cloud providers offer storage accounts (AWS S3 Buckets, Azure Storage Accounts, Google Cloud Storage, etc.), which will be the primary target of these types of actors. Assuming they have the right permissions, direct access via the console, simple CLI commands, or API calls can be used to interact with this storage. At a high-level the following steps will be carried out:

  1. Enumerate contents of storage to identify target data.
  2. Download identified data out of the environment.
  3. Delete the downloaded data from the cloud environment.
  4. Create a ransom note within the targeted storage notifying the victim of the attack and providing contact information to negotiate the ransom.

These are the minimum TTPs we will likely observe when investigating cloud ransomware attacks. There may also be other steps the threat actor performs to increase the chances of a successful attack though. For example, in Invictus Incident Response’s case, they observed persistence being established via the creation of new user accounts. The additional TTPs implemented by threat actors will likely be based on a) the permissions obtained as part of initial access or privilege escalation and b) the level of sophistication of the threat actor. Only time and public reporting will provide us with a detailed picture of the full extent of what the evolution of ransomware when moving to the cloud looks like.

Preparing for the Worst

While the threat landscape associated with ransomware in the cloud is relatively unknown, there are many steps we can take to reduce the threat of an attack as well as prepare for the scenario where our defenses fail. From the defense perspective, there are a couple key things that should be done.

First, understand your identity and access management (IAM) to ensure permissions are adhering to least privilege. Along the same lines of access management, ensure that all API keys and service accounts are secured. These credentials should not be hard-coded into any source code and should not be over-permissioned. Since initial access via compromised credentials is a key step in attacks like this, ensuring that accounts are locked down is a great first step to limiting the risk of such an attack.

Secondly, ensure your data is secured and backed up. Backing data up in a disparate system may help should the initial system become compromised. Similar to IAM security, ensuring that data has restricted access, especially sensitive data, limits the scope of what a threat actor can do if they do gain access to the cloud environment. Cloud providers may have additional controls to reduce the risk of exfiltrating, modifying, or deleting data that should be investigated. For example, S3 buckets have a feature called “object lock” that can prevent certain versions of objects from being deleted, as detailed here: https://for528.com/aws-lock. Investigate protective controls offered by your cloud vendor for your storage accounts. Data should also be backed up. While this won’t prevent the threat of data being leaked if stolen, it will allow for the recovery of deleted data, allowing organization operations to more quickly resume post-attack. All of the cloud providers have backup services they offer.

Those are just a couple of the key steps that can be taken to defend against a cloud ransomware attack, or at least reduce the impact. There are many more defensive controls that can be enabled. Many of the cloud vendors publish materials providing guidance on security data. AWS even recently released the AWS Blueprint for Ransomware Defense, which provides a mapping between their offerings and NIST security controls. For defenses in Azure, FOR528 course author Ryan Chapman has released tips for both defending against and responding to ransomware in Azure environments: https://for528.com/azure. Whatever cloud platform you are leveraging, investigate defensive controls offered by the provider that align with countering the TTPs discussed above.

Moving onto the preparation side of things, to ensure that if the worst happens we can respond effectively, there are three key takeaways to mention:

  1. Log Analysis: To figure out what happened, you need to have the evidence to do so. The key word here is visibility. In the cloud, this is your logs. Many logs are not enabled by default. Those that are often have retention limits or are stored in locations that are not prime for analysis. Ensure the that:
    1. Non-default logs are enabled. For example, for sensitive data enable object access logging.
    2. Logs are retained and centralized. Determine where you want to analyze or retrieve logs from in the case of an incident and ensure all logs are forwarded to that location.
  2. Understanding of the Environment: When an incident occurs, you don’t want to waste time trying to learn about the cloud architecture or who is storing data where. Ideally, you should be able to begin your response with a clear understanding of what is in scope given a certain situation.
  3. Ransomware Procedures: Incident Response teams should always have well-documented procedures on how they will respond to incidents. A dedicated ransomware playbook should be created to understand how investigations specifically associated with cloud ransomware attacks should be carried out.
    1. This should not be limited to your first party teams. Should you work with any third party teams such as MSSPs, incident response firms, and others, be sure to ensure they too have cloud-specific playbooks available. Discuss this directly with these teams.

Once again, these are just a few of the steps that can be taken to prepare for a cloud ransomware incident. In general, your team needs to discuss what a ransomware incident in their cloud environment would look like, what defensive controls can reduce the impact, and how the team will respond if required.

Summary

In this blog post, we discussed the evolution of ransomware into cloud environments, the TTPs leveraged by the threat actors, and how we can defend against and prepare for such attacks. Cloud ransomware is still a new concept, but given the popularity of ransomware attacks in recent years combined with the move to the cloud, it will not be surprising to see threat actors evolve into this space. As we learn more about how these threat actors operate, we will be able to more effectively defend against their attacks. For now though, there are steps we can take to prepare for if a trend towards cloud ransomware takes place.

If you want to learn more about responding to ransomware incidents, check out SANS FOR528: Ransomware for Incident Responders. For more on cloud incident response, SANS offers FOR509: Enterprise Cloud Forensics and Incident Response.

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Swaziland
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tags:
  • Digital Forensics, Incident Response & Threat Hunting

Related Content

Blog
FOR509.png
Digital Forensics, Incident Response & Threat Hunting
September 8, 2023
FOR509 – Always Evolving
With a significant amount of new content and labs in this release, it’s by far biggest update since last year
Megan_Roddie_370x370.png
Megan Roddie-Fonseca
read more
Blog
Cloud_Blog.png
Digital Forensics, Incident Response & Threat Hunting
September 4, 2023
Evolution of Cloud Tactics, Techniques, and Procedures
This blog post discussed techniques implemented across the kill chain, from initial access to lateral movement to impact.
Megan_Roddie_370x370.png
Megan Roddie-Fonseca
read more
Blog
Hope_for_the_Best_Prepare_for_the_Worst_How_to_prepare_for_cloud_DFIR.png
Digital Forensics, Incident Response & Threat Hunting
August 19, 2023
Hope for the Best, Prepare for the Worst: How to prepare for cloud DFIR
Understand the specific steps that can be taken to significantly improve your organization's cloud incident response efficiency and efficacy.
Megan_Roddie_370x370.png
Megan Roddie-Fonseca
read more
  • Register to Learn
  • Courses
  • Certifications
  • Degree Programs
  • Cyber Ranges
  • Job Tools
  • Security Policy Project
  • Posters & Cheat Sheets
  • White Papers
  • Focus Areas
  • Cyber Defense
  • Cloud Security
  • Cybersecurity Leadership
  • Digital Forensics
  • Industrial Control Systems
  • Offensive Operations
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Swaziland
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • © 2023 SANS™ Institute
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn