Documentation

User Guide 

Explore detailed information and instructions for working with HAQM Security Lake.

HTML | PDF

API Reference

Learn more about the Security Lake API operations and example requests and responses for each operation.

HTML | PDF

Ebook and Infographic

Infographic

Plan Your HAQM Security Lake Journey

Ebook

Democratizing Security Data with HAQM Security Lake and Industry Leaders for Improved Protection

Webinars

Webinar

AWS re:Invent 2024 - Accelerate security analytics across hybrid environments with AWS (SEC235)

Webinar

AWS re:Inforce 2024 - Developing an autonomous framework with Security Lake & Torc Robotics (TDR301)

Webinar

AWS re:Invent 2023 - Streamlining security investigations with HAQM Security Lake (SEC234)

Webinar

AWS re:Inforce 2023 - Build your security data lake with HAQM Security Lake, featuring IPG (TDR205)

Webinar

AWS re:Invent 2022 - [NEW LAUNCH!] Introducing HAQM Security Lake (SEC216)

Blog posts and articles

BLOG POST

Patterns for consuming custom log sources in HAQM Security Lake

Author: Pratima Singh and Chris Lamont-Smith
Published date: 15 JUL 2024
BLOG POST

How HAQM Security Lake is helping customers simplify security data management for proactive threat analysis

Author: Nisha Amthul, Jonathan Garzon, and Ross Warren
Published date: 07 MAY 2024
BLOG POST

How to develop an HAQM Security Lake POC

Author: Anna McAbee, Marc Luescher, and Marshall Jones
Published date: 28 FEB 2024
  • Date

No items returned.

1

Videos

AWS OnAir: Transform Security Analytics with HAQM Security Lake & HAQM OpenSearch (19:50)
Operationalize AWS WAF Web ACL logs with HAQM Security Lake (13:23)
HAQM OpenSearch Ingestion supports HAQM Security Lake event ingestion (14:56)
How to get started and manage HAQM Security Lake with AWS Organizations (7:58)
HAQM Security Lake with HAQM Athena and HAQM QuickSight (11:31)
Setting up a custom source in HAQM Security Lake (8:15)