5.1 Setting up notifications5.2 Set up a weekly vulnerability summary email5.3 Automated Security Response on AWS5.4 Building your own automated response5.5 Enriching security findings with investigative data