Table of Contents for
Practical Cloud Security

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition Practical Cloud Security by Chris Dotson Published by O'Reilly Media, Inc., 2019
  1. Cover
  2. nav
  3. Practical Cloud Security
  4. Practical Cloud Security
  5. Preface
  6. 1. Principles and Concepts
  7. 2. Data Asset Management and Protection
  8. 3. Cloud Asset Management and Protection
  9. 4. Identity and Access Management
  10. 5. Vulnerability Management
  11. 6. Network Security
  12. 7. Detecting, Responding, and Recovering from Security Incidents
  13. Index
  14. About the Author(s)
  15. Colophon
  1. Preface
    1. Conventions Used in This Book
    2. Using Code Examples
    3. O’Reilly
    4. How to Contact Us
    5. Acknowledgments
  2. 1. Principles and Concepts
    1. Least Privilege
    2. Defense in Depth
    3. Threat Actors, Diagrams, and Trust Boundaries
    4. Cloud Delivery Models
    5. The Cloud Shared Responsibility Model
    6. Risk Management
  3. 2. Data Asset Management and Protection
    1. Data Identification and Classification
      1. Example Data Classification Levels
      2. Relevant Industry or Regulatory Requirements
    2. Data Asset Management in Cloud
      1. Tagging Cloud Resources
    3. Protecting Data in the Cloud
      1. Tokenization
      2. Encryption
      3. How encryption foils different types of attacks
    4. Summary
  4. 3. Cloud Asset Management and Protection
    1. Differences from Traditional IT
    2. Types of Cloud Assets
      1. Compute assets
      2. Storage assets
      3. Network assets
    3. Asset Management Pipeline
      1. Procurement leaks
      2. Processing leaks
      3. Tooling leaks
      4. Findings leaks
    4. Tagging Cloud Assets
    5. Summary
  5. 4. Identity and Access Management
    1. Differences from Traditional IT
    2. Life cycle for identity and access
    3. Request
    4. Approve
    5. Create, Delete, Grant, or Revoke
    6. Authentication
      1. Cloud IAM Identities
      2. Business-to-Customer and Business-to-Employee
      3. Multi-Factor Authentication
      4. Passwords and API keys
      5. Shared IDs
      6. Federated Identity
      7. Single Sign On
      8. Instance Metadata and Identity Documents
      9. Secrets Management
    7. Authorization
      1. Centralized Authorization
      2. Roles
    8. Revalidate
    9. Putting it all together in the Sample Application
    10. Summary
  6. 5. Vulnerability Management
    1. Differences from Traditional IT
    2. Vulnerable areas
      1. Data Access
      2. Application
      3. Middleware
      4. Operating System
      5. Network
      6. Virtualized Infrastructure
      7. Physical Infrastructure
    3. Finding and Fixing Vulnerabilities
      1. Network vulnerability scanners
      2. Agentless scanners and configuration management
      3. Agent-based scanners and configuration management
      4. Cloud provider security management tools
      5. Container scanners
      6. Dynamic application scanners (DAST)
      7. Static code scanners (SAST)
      8. Software Composition Analysis (SCA)
      9. Interactive code scanners (IAST)
      10. Runtime application self-protection (RASP)
      11. Manual code reviews
      12. Penetration tests
      13. User reports
      14. Example tools for vulnerability and configuration management
    4. Risk Management Processes
    5. Vulnerability Management Metrics
      1. Tool coverage
      2. Mean time to remediate
      3. Systems/applications with open vulnerabilities
      4. Percentage of false positives
      5. Percentage of false negatives
      6. Vulnerability recurrence rate
    6. Change Management
    7. Putting it all together in the Sample Application
    8. Summary
  7. 6. Network Security
    1. Differences from Traditional IT
    2. Concepts and Definitions
      1. Whitelists and Blacklists
      2. DMZ
      3. Proxies
      4. Software Defined Networking (SDN)
      5. Network Features Virtualization (NFV) or Virtual Network Functions (VNFs)
      6. Overlay Networks and Encapsulation
      7. Virtual Private Cloud (VPC)
      8. Network Address Translation (NAT)
      9. IPv6
    3. Putting it all together in the sample application
      1. Encryption in Motion
      2. Firewalls and Network Segmentation
      3. Allow Administrative Access
      4. Web Application Firewalls and RASP
      5. Anti-DDoS
      6. Intrusion detection and prevention systems
      7. Egress Filtering
      8. Data Loss Prevention
    4. Summary
  8. 7. Detecting, Responding, and Recovering from Security Incidents
    1. Differences from Traditional IT
    2. What to Watch
      1. Privileged user access
      2. Logs from defensive tooling
      3. Cloud Service Logs and Metrics
      4. Operating System Logs and Metrics
      5. Middleware logs
      6. Secrets Server
      7. Your Application
    3. How to Watch
      1. Aggregation and Retention
      2. Parsing logs
      3. Searching and Correlation
      4. Alerting and Automated Response
      5. Security Information and Event Managers (SIEMs)
      6. Threat Hunting
    4. Preparing for an Incident
      1. Team
      2. Plans
      3. Tools
    5. Responding to an Incident
      1. Cyber Kill Chains
      2. The OODA loop
      3. Cloud Forensics
      4. Blocking Unauthorized Access
      5. Stopping data exfiltration and command and control
    6. Recovery
      1. Redeploying IT systems
      2. Notifications
      3. Lessons Learned
    7. Example Metrics
    8. Example Tools for Detection, Response, and Recovery
    9. Putting it all together in the sample application
      1. Monitoring the Protective Systems
      2. Monitoring the Application
      3. Monitoring the Administrators
      4. Understanding the Auditing Infrastructure
    10. Summary
  9. Index
Back to top