万本电子书0元读

万本电子书0元读

顶部广告

Cloud Security Automation电子书

售       价:¥

1人正在读 | 0人评论 9.8

作       者:Prashant Priyam

出  版  社:Packt Publishing

出版时间:2018-03-28

字       数:34.0万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Secure public and private cloud workloads with this comprehensive learning guide. About This Book ? Take your cloud security functions to the next level by automation ? Learn to automate your security functions on AWS and OpenStack ? Practical approach towards securing your workloads efficiently Who This Book Is For This book is targeted at DevOps Engineers, Security professionals, or any stakeholders responsible for securing cloud workloads. Prior experience with AWS or OpenStack will be an advantage. What You Will Learn ? Define security for public and private cloud services ? Address the security concerns of your cloud ? Understand Identity and Access Management ? Get acquainted with cloud storage and network security ? Improve and optimize public and private cloud security ? Automate cloud security ? Understand the security compliance requirements of your cloud In Detail Security issues are still a major concern for all IT organizations. For many enterprises, the move to cloud computing has raised concerns for security, but when applications are architected with focus on security, cloud platforms can be made just as secure as on-premises platforms. Cloud instances can be kept secure by employing security automation that helps make your data meet your organization's security policy. This book starts with the basics of why cloud security is important and how automation can be the most effective way of controlling cloud security. You will then delve deeper into the AWS cloud environment and its security services by dealing with security functions such as Identity and Access Management and will also learn how these services can be automated. Moving forward, you will come across aspects such as cloud storage and data security, automating cloud deployments, and so on. Then, you'll work with OpenStack security modules and learn how private cloud security functions can be automated for better time- and cost-effectiveness. Toward the end of the book, you will gain an understanding of the security compliance requirements for your Cloud. By the end of this book, you will have hands-on experience of automating your cloud security and governance. Style and approach This book follows a step-by-step, practical approach to help automate and secure your cloud account structure in an Amazon Web Services (AWS) and OpenStack environment.
目录展开

Title Page

Copyright and Credits

Cloud Security Automation

Packt Upsell

Why subscribe?

PacktPub.com

Contributors

About the author

About the reviewers

Packt is searching for authors like you

Preface

Who this book is for

What this book covers

To get the most out of this book

Download the example code files

Download the color images

Conventions used

Get in touch

Reviews

Disclaimer

Introduction to Cloud Security

Types of cloud

Public cloud

Private cloud

Hybrid cloud

Software as a Service

Platform as a Service

Infrastructure as a Service

Cloud security

Confidentiality

Integrity

Availability

Authentication

Authorization

Auditing

Shared responsibility model

Shared responsibility model for infrastructure

Shared responsibility model for container service

Shared responsibility model for abstract services

Key concern areas of cloud security

Infrastructure level

User access level

Storage and data level

Application access level

Network level

Logging and monitoring level

Summary

Understanding the World of Cloud Automation

What is DevOps?

Why do we need automation?

Infrastructure as Code

Configuration management

Automate deployment – AWS OpsWorks

Quick recap

Summary

Identity and Access Management in the Cloud

IAM features

How does AWS work in IAM?

Anatomy of IAM users, groups, roles, and policies

IAM users

IAM groups

IAM roles

IAM policies

Access right delegation using IAM

Temporary credentials

Cross-account access

Identity federation

IAM best practices

Other security options in AWS

AWS Certificate Manager

WAF and Shield

Cloud hardware security module

Cognito

Amazon Macie

AWS Inspector

AWS GuardDuty

Quick recap

Summary

Cloud Network Security

Virtual private cloud

NACL

Security group

VPN connection

Direct Connect

DNS security

CDN-level security

Logging and monitoring

CloudTrail

CloudWatch

Quick recap

Summary

Cloud Storage and Data Security

EBS

Fault tolerance at EBS

RAID 0

RAID 1

Encryption in EBS

S3

Security in S3

AWS Glacier

Security in AWS Glacier

EFS

Security in EFS

Storage gateway

Security in the storage gateway

AWS Snowball

Security in Snowball

A quick recap

Summary

Cloud Platform Security

RDS

Security in RDS

Using security groups

Using IAM

Using SSL to encrypt database connections

Security best practices for AWS RDS

Back up and restore database

Monitoring of RDS

AWS Redshift

Security in Redshift

AWS DynamoDB

Security in DynamoDB

ElastiCache

Securing ElastiCache

VPC-level security

Authentication and access control

Authenticating with Redis authentication

Data encryption

Data-in-transit encryption

Data-at-rest encryption

AWS ECS

Securing ECS

SQS

Securing SQS

Let's have a recap

Summary

Private Cloud Security

Securing hypervisor

Securing KVM

Securing XenServer

Securing ESXi

Securing compute

IAM

Authentication

Authentication methods – internal and external

Authorization

Policy, tokens, and domains

Federated identity

Horizon – OpenStack dashboard service

Cinder – OpenStack block storage

Glance – OpenStack image storage

Manila – OpenStack shared file storage

Neutron – OpenStack network

Swift – OpenStack object storage

Message queue

Database services

Data privacy and security for tenants

Security for instances

Quick recap

Summary

Automating Cloud Security

Infrastructure as Code

CI/CD

Monitoring

Summary

Cloud Compliance

Cloud security compliance

Security compliance – ISMS

Security compliance – PCI DSS

Quick recap

Summary

Other Books You May Enjoy

Leave a review - let other readers know what you think

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部