Empirical Cloud Security : : Practical Intelligence to Evaluate Risks and Attacks / / Aditya K. Sood.

This book is designed for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and pr...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
MitwirkendeR:
Place / Publishing House:Dulles, VA : : Mercury Learning and Information, , [2021]
©2021
Year of Publication:2021
Language:English
Online Access:
Physical Description:1 online resource (444 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Other title:Frontmatter --
CONTENTS --
PREFACE --
ACKNOWLEDGMENTS --
ABOUT THE AUTHOR --
CHAPTER 1 CLOUD ARCHITECTURE AND SECURITY FUNDAMENTALS --
CHAPTER 2 IAM FOR AUTHENTICATION AND AUTHORIZATION: SECURITY ASSESSMENT --
CHAPTER 3 CLOUD INFRASTRUCTURE: NETWORK SECURITY ASSESSMENT --
CHAPTER 4 DATABASE AND STORAGE SERVICES: SECURITY ASSESSMENT --
CHAPTER 5 DESIGN AND ANALYSIS OF CRYPTOGRAPHY CONTROLS: SECURITY ASSESSMENT --
CHAPTER 6 CLOUD APPLICATIONS: SECURE CODE REVIEW --
CHAPTER 7 CLOUD MONITORING AND LOGGING: SECURITY ASSESSMENT --
CHAPTER 8 PRIVACY IN THE CLOUD --
CHAPTER 9 CLOUD SECURITY AND PRIVACY: FLAWS, ATTACKS, AND IMPACT ASSESSMENTS --
CHAPTER 10 MALICIOUS CODE IN THE CLOUD --
CHAPTER 11 THREAT INTELLIGENCE AND MALWARE PROTECTION IN THE CLOUD --
CONCLUSION --
APPENDIX A LIST OF SERVERLESS COMPUTING SERVICE --
APPENDIX B LIST OF SERVERLESS FRAMEWORKS --
APPENDIX C LIST OF SAAS, PAAS, IAAS, AND FAAS PROVIDERS --
APPENDIX D LIST OF CONTAINERIZED SERVICES AND OPEN SOURCE SOFTWARE --
APPENDIX E LIST OF CRITICAL RDP VULNERABILITIES --
APPENDIX F LIST OF NETWORK TOOLS AND SCRIPTS --
APPENDIX G LIST OF DATABASES DEFAULT TCP/UDP PORTS --
APPENDIX H LIST OF DATABASE ASSESSMENT TOOLS, COMMANDS, AND SCRIPTS --
APPENDIX I LIST OF COUCHDB API COMMANDS AND RESOURCES --
APPENDIX J LIST OF CQLSH CASSANDRA DATABASE SQL QUERIES --
APPENDIX K LIST OF ELASTICSEARCH QUERIES --
APPENDIX L AWS SERVICES CLI COMMANDS --
APPENDIX M LIST OF VAULT AND SECRET MANAGERS --
APPENDIX N LIST OF TLS SECURITY VULNERABILITIES FOR ASSESSMENT --
APPENDIX O LIST OF CLOUD LOGGING AND MONITORING SERVICES --
INDEX
Summary:This book is designed for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of your cloud infrastructure and applications and shows how to make your cloud infrastructure secure to combat threats, attacks, and prevent data breaches. The chapters are designed with a granular framework, starting with the security concepts, followed by hand-on assessment techniques based on real-world studies, and concluding with recommendations including best practices. FEATURES: Includes practical strategies for assessing the security and privacy of your cloud infrastructure and applicationsCovers topics such as cloud architecture and security fundamentals, database and storage security, data privacy, security and risk assessments, controls related to continuous monitoring, and morePresents several case studies revealing how threat actors abuse and exploit cloud environments to spread malware
Format:Mode of access: Internet via World Wide Web.
ISBN:9781683926849
DOI:10.1515/9781683926849
Access:restricted access
Hierarchical level:Monograph
Statement of Responsibility: Aditya K. Sood.