Details
Title | Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack. |
---|---|
Creators | Priyam Prashant. |
Imprint | Birmingham: Packt Publishing, 2018 |
Collection | Электронные книги зарубежных издательств ; Общая коллекция |
Subjects | Cloud computing — Security measures. ; Computer networks — Security measures. ; Computers — Networking — Security. ; Computers — System Administration — General. ; Computer networking & communications. ; Network security. ; Computers — Security — General. ; Computer security. ; COMPUTERS / Computer Literacy ; COMPUTERS / Computer Science ; COMPUTERS / Data Processing ; COMPUTERS / Hardware / General ; COMPUTERS / Information Technology ; COMPUTERS / Machine Theory ; COMPUTERS / Reference ; EBSCO eBooks |
Document type | Other |
File type | |
Language | English |
Rights | Доступ по паролю из сети Интернет (чтение, печать, копирование) |
Record key | on1030820693 |
Record create date | 4/7/2018 |
Allowed Actions
pdf/1775072.pdf | – |
Action 'Read' will be available if you login or access site from another network
Action 'Download' will be available if you login or access site from another network
|
---|---|---|
epub/1775072.epub | – |
Action 'Download' will be available if you login or access site from another network
|
Group | Anonymous |
---|---|
Network | Internet |
In the current market, enterprise organizations are moving rapidly towards the cloud infrastructure because of its flexibility and cost effectiveness. Hence, it has become extremely important to have a security framework in place. Automating security functions will play a key role when it comes to cloud governance. This book supplies best ...
Network | User group | Action |
---|---|---|
ILC SPbPU Local Network | All |
|
Internet | Authorized users SPbPU |
|
Internet | Anonymous |
|
- Cover
- Title Page
- Copyright and Credits
- Packt Upsell
- Contributors
- Table of Contents
- Preface
- Chapter 1: Introduction to Cloud Security
- Types of cloud
- Public cloud
- Private cloud
- Hybrid cloud
- Software as a Service
- Platform as a Service
- Infrastructure as a Service
- Cloud security
- Confidentiality
- Integrity
- Availability
- Authentication
- Authorization
- Auditing
- Shared responsibility model
- Shared responsibility model for infrastructure
- Shared responsibility model for container service
- Shared responsibility model for abstract services
- Key concern areas of cloud security
- Infrastructure level
- User access level
- Storage and data level
- Application access level
- Network level
- Logging and monitoring level
- Summary
- Types of cloud
- Chapter 2: Understanding the World of Cloud Automation
- What is DevOps?
- Why do we need automation?
- Infrastructure as Code
- Configuration management
- Automate deployment – AWS OpsWorks
- Quick recap
- Summary
- What is DevOps?
- Chapter 3: Identity and Access Management in the Cloud
- IAM features
- How does AWS work in IAM?
- Anatomy of IAM users, groups, roles, and policies
- IAM users
- IAM groups
- IAM roles
- IAM policies
- Access right delegation using IAM
- Temporary credentials
- Cross-account access
- Identity federation
- IAM best practices
- Anatomy of IAM users, groups, roles, and policies
- Other security options in AWS
- AWS Certificate Manager
- WAF and Shield
- Cloud hardware security module
- Cognito
- Amazon Macie
- AWS Inspector
- AWS GuardDuty
- Quick recap
- Summary
- Chapter 4: Cloud Network Security
- Virtual private cloud
- NACL
- Security group
- VPN connection
- Direct Connect
- DNS security
- CDN-level security
- Logging and monitoring
- CloudTrail
- CloudWatch
- Quick recap
- Summary
- Virtual private cloud
- Chapter 5: Cloud Storage and Data Security
- EBS
- Fault tolerance at EBS
- RAID 0
- RAID 1
- Encryption in EBS
- Fault tolerance at EBS
- S3
- Security in S3
- AWS Glacier
- Security in AWS Glacier
- EFS
- Security in EFS
- Storage gateway
- Security in the storage gateway
- AWS Snowball
- Security in Snowball
- A quick recap
- Summary
- EBS
- Chapter 6: Cloud Platform Security
- RDS
- Security in RDS
- Using security groups
- Using IAM
- Using SSL to encrypt database connections
- Security best practices for AWS RDS
- Back up and restore database
- Monitoring of RDS
- Security in RDS
- AWS Redshift
- Security in Redshift
- AWS DynamoDB
- Security in DynamoDB
- ElastiCache
- Securing ElastiCache
- VPC-level security
- Authentication and access control
- Authenticating with Redis authentication
- Data encryption
- Data-in-transit encryption
- Data-at-rest encryption
- Securing ElastiCache
- AWS ECS
- Securing ECS
- SQS
- Securing SQS
- Let's have a recap
- Summary
- RDS
- Chapter 7: Private Cloud Security
- Securing hypervisor
- Securing KVM
- Securing XenServer
- Securing ESXi
- Securing compute
- IAM
- Authentication
- Authentication methods – internal and external
- Authorization
- Policy, tokens, and domains
- Federated identity
- Horizon – OpenStack dashboard service
- Cinder – OpenStack block storage
- Glance – OpenStack image storage
- Manila – OpenStack shared file storage
- Neutron – OpenStack network
- Swift – OpenStack object storage
- Message queue
- Database services
- Data privacy and security for tenants
- Security for instances
- Quick recap
- Summary
- Securing hypervisor
- Chapter 8: Automating Cloud Security
- Infrastructure as Code
- CI/CD
- Monitoring
- Summary
- Chapter 9: Cloud Compliance
- Cloud security compliance
- Security compliance – ISMS
- Security compliance – PCI DSS
- Quick recap
- Summary
- Cloud security compliance
- Other Books You May Enjoy
- Index