Book description
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up.
Developers, IT architects, and security professionals will learn cloud-specific techniques for securing popular cloud platforms such as Amazon Web Services, Microsoft Azure, and IBM Cloud. IBM Distinguished Engineer Chris Dotson shows you how to establish data asset management, identity and access management (IAM), vulnerability management, network security, and incident response in your cloud environment.
- Learn the latest threats and challenges in the cloud security space
- Manage cloud providers that store or process data or deliver administrative control
- Learn how standard principles and concepts—such as least privilege and defense in depth—apply in the cloud
- Understand the critical role played by IAM in the cloud
- Use best tactics for detecting, responding, and recovering from the most common security incidents
- Manage various types of vulnerabilities, especially those common in multicloud or hybrid cloud architectures
- Examine privileged access management in cloud environments
Publisher resources
Table of contents
- Preface
- 1. Principles and Concepts
- 2. Data Asset Management and Protection
- 3. Cloud Asset Management and Protection
- 4. Identity and Access Management
-
5. Vulnerability Management
- Differences from Traditional IT
- Vulnerable Areas
-
Finding and Fixing Vulnerabilities
- Network Vulnerability Scanners
- Agentless Scanners and Configuration Management Systems
- Agent-Based Scanners and Configuration Management Systems
- Cloud Workload Protection Platforms
- Container Scanners
- Dynamic Application Scanners (DAST)
- Static Application Scanners (SAST)
- Software Composition Analysis Tools (SCA)
- Interactive Application Scanners (IAST)
- Runtime Application Self-Protection Scanners (RASP)
- Manual Code Reviews
- Penetration Tests
- User Reports
- Example Tools for Vulnerability and Configuration Management
- Risk Management Processes
- Vulnerability Management Metrics
- Change Management
- Putting It All Together in the Sample Application
- Conclusion
- Exercises
- 6. Network Security
- 7. Detecting, Responding to, and Recovering from Security Incidents
- A. Exercise Solutions
- Index
- About the Author
Product information
- Title: Practical Cloud Security, 2nd Edition
- Author(s):
- Release date: October 2023
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098148171
You might also like
book
Practical Cloud Security
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and …
video
Certified Cloud Security Professional (CCSP)
11 hours of video instruction to learn everything you need to know about the Certified Cloud …
book
Cloud Computing: Concepts, Technology, Security, and Architecture, 2nd Edition
Cloud Computing: Concepts, Technology, Security & Architecture Cloud computing has become an integral and foundational part …
book
Security in Computing, 6th Edition
The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to …