Cloud security handbook find out how to effectively secure cloud environments using AWS, Azure, and GCP

A comprehensive reference guide to securing the basic building blocks of cloud services, with actual examples for leveraging Azure, AWS, and GCP built-in services and capabilities Key Features Discover practical techniques for implementing cloud security Learn how to secure your data and core cloud...

Descripción completa

Detalles Bibliográficos
Otros Autores: Estrin, Eyal, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited [2022]
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009661635006719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright
  • Dedication
  • Contributors
  • Table of Contents
  • Preface
  • Section 1: Securing Infrastructure Cloud Services
  • Chapter 1: Introduction to Cloud Security
  • Technical requirements
  • What is a cloud service?
  • What are the cloud deployment models?
  • What are the cloud service models?
  • Why we need security
  • What is the shared responsibility model?
  • AWS and the shared responsibility model
  • Azure and the shared responsibility model
  • GCP and the shared responsibility model
  • Command-line tools
  • AWS CLI
  • Azure CLI
  • Google Cloud SDK
  • Summary
  • Chapter 2: Securing Compute Services
  • Technical requirements
  • Securing VMs
  • Securing Amazon Elastic Compute Cloud (EC2)
  • Securing Azure Virtual Machines
  • Securing Google Compute Engine (GCE) and VM instances
  • Securing managed database services
  • Securing Amazon RDS for MySQL
  • Securing Azure Database for MySQL
  • Securing Google Cloud SQL for MySQL
  • Securing containers
  • Securing Amazon Elastic Container Service (ECS)
  • Securing Amazon Elastic Kubernetes Service (EKS)
  • Securing Azure Container Instances (ACI)
  • Securing Azure Kubernetes Service (AKS)
  • Securing Google Kubernetes Engine (GKE)
  • Securing serverless/function as a service
  • Securing AWS Lambda
  • Securing Azure Functions
  • Securing Google Cloud Functions
  • Summary
  • Chapter 3: Securing Storage Services
  • Technical requirements
  • Securing object storage
  • Securing Amazon Simple Storage Service
  • Securing Azure Blob storage
  • Securing Google Cloud Storage
  • Securing block storage
  • Best practices for securing Amazon Elastic Block Store
  • Best practices for securing Azure managed disks
  • Best practices for securing Google Persistent Disk
  • Summary
  • Securing file storage
  • Securing Amazon Elastic File System
  • Securing Azure Files.
  • Securing Google Filestore
  • Securing the CSI
  • Securing CSI on AWS
  • Securing CSI on Azure
  • Securing CSI on GCP
  • Summary
  • Chapter 4: Securing Networking Services
  • Technical requirements
  • Securing virtual networking
  • Securing Amazon Virtual Private Cloud
  • Securing Azure VNet
  • Securing Google Cloud VPC
  • Securing DNS services
  • Securing Amazon Route 53
  • Securing Azure DNS
  • Securing Google Cloud DNS
  • Securing CDN services
  • Securing Amazon CloudFront
  • Securing Azure CDN
  • Securing Google Cloud CDN
  • Securing VPN services
  • Securing AWS Site-to-Site VPN
  • Securing AWS Client VPN
  • Securing Azure VPN Gateway (Site-to-Site)
  • Securing Azure VPN Gateway (Point-to-Site)
  • Securing Google Cloud VPN
  • Securing DDoS protection services
  • Securing AWS Shield
  • Securing Azure DDoS Protection
  • Securing Google Cloud Armor
  • Securing WAF services
  • Securing AWS WAF
  • Securing Azure WAF
  • Summary
  • Section 2: Deep Dive into IAM, Auditing, and Encryption
  • Chapter 5: Effective Strategies to Implement IAM Solutions
  • Technical requirements
  • Introduction to IAM
  • Failing to manage identities
  • Securing cloud-based IAM services
  • Securing AWS IAM
  • Auditing AWS IAM
  • Securing Azure AD
  • Auditing Azure AD
  • Securing Google Cloud IAM
  • Auditing Google Cloud IAM
  • Securing directory services
  • Securing AWS Directory Service
  • Securing Azure Active Directory Domain Services (Azure AD DS)
  • Securing Google Managed Service for Microsoft AD
  • Configuring MFA
  • Summary
  • Chapter 6: Monitoring and Auditing Your Cloud Environments
  • Technical requirements
  • Conducting security monitoring and audit trails
  • Security monitoring and audit trails using AWS CloudTrail
  • Security monitoring using AWS Security Hub
  • Best practices for using AWS Security Hub.
  • Security monitoring and audit trails using Azure Monitor
  • Best practices for using Azure Monitor
  • Security monitoring and approval process using Customer Lockbox
  • Best practices for using Customer Lockbox
  • Security monitoring and audit trail using Google Cloud Logging
  • Security monitoring using Google Security Command Center
  • Security monitoring and approval process using Access Transparency and Access Approval
  • Conducting threat detection and response
  • Using Amazon Detective for threat detection
  • Using Amazon GuardDuty for threat detection
  • Security monitoring using Microsoft Defender for Cloud
  • Using Azure Sentinel for threat detection
  • Using Azure Defender for threat detection
  • Using Google Security Command Center for threat detection and prevention
  • Conducting incident response and digital forensics
  • Conducting incident response in AWS
  • Conducting incident response in Azure
  • Conducting incident response in Google Cloud Platform
  • Summary
  • Chapter 7: Applying Encryption in Cloud Services
  • Technical requirements
  • Introduction to encryption
  • Symmetric encryption
  • Asymmetric encryption
  • Best practices for deploying KMSes
  • AWS Key Management Service (KMS)
  • AWS CloudHSM
  • Azure Key Vault
  • Azure Dedicated/Managed HSM
  • Google Cloud Key Management Service (KMS)
  • Best practices for deploying secrets management services
  • AWS Secrets Manager
  • Google Secret Manager
  • Best practices for using encryption in transit
  • IPSec
  • Transport Layer Security (TLS)
  • Best practices for using encryption at rest
  • Object storage encryption
  • Block storage encryption
  • Full database encryption
  • Row-level security
  • Encryption in use
  • AWS Nitro Enclaves
  • Azure Confidential Computing
  • Google Confidential Computing
  • Summary
  • Section 3: Threats and Compliance Management.
  • Chapter 8: Understanding Common Security Threats to Cloud Services
  • Technical requirements
  • The MITRE ATT&amp
  • CK framework
  • Detecting and mitigating data breaches in cloud services
  • Common consequences of data breaches
  • Best practices for detecting and mitigating data breaches in cloud environments
  • Common AWS services to assist in the detection and mitigation of data breaches
  • Common Azure services to assist in the detection and mitigation of data breaches
  • Common GCP services to assist in the detection and mitigation of data breaches
  • Detecting and mitigating misconfigurations in cloud services
  • Common AWS services to assist in the detection and mitigation of misconfigurations
  • Common Azure services to assist in the detection and mitigation of misconfigurations
  • Common GCP services to assist in the detection and mitigation of misconfigurations
  • Detecting and mitigating insufficient IAM and key management in cloud services
  • Common AWS services to assist in the detection and mitigation of insufficient IAM and key management
  • Common Azure services to assist in the detection and mitigation of insufficient IAM and key management
  • Common GCP services to assist in the detection and mitigation of insufficient IAM and key management
  • Detecting and mitigating account hijacking in cloud services
  • Common AWS services to assist in the detection and mitigation of account hijacking
  • Common Azure services to assist in the detection and mitigation of account hijacking
  • Common GCP services to assist in the detection and mitigation of account hijacking
  • Detecting and mitigating insider threats in cloud services
  • Common AWS services to assist in the detection and mitigation of insider threats
  • Common Azure services to assist in the detection and mitigation of insider threats.
  • Common GCP services to assist in the detection and mitigation of insider threats
  • Detecting and mitigating insecure APIs in cloud services
  • Common AWS services to assist in the detection and mitigation of insecure APIs
  • Common Azure services to assist in the detection and mitigation of insecure APIs
  • Common GCP services to assist in the detection and mitigation of insecure APIs
  • Detecting and mitigating the abuse of cloud services
  • Common AWS services to assist in the detection and mitigation of the abuse of cloud services
  • Common Azure services to assist in the detection and mitigation of the abuse of cloud services
  • Common GCP services to assist in the detection and mitigation of the abuse of cloud services
  • Summary
  • Chapter 9: Handling Compliance and Regulation
  • Technical requirements
  • Compliance and the shared responsibility model
  • Introduction to compliance with regulatory requirements and industry best practices
  • How to maintain compliance in AWS
  • How to maintain compliance in Azure
  • How to maintain compliance in GCP
  • Summary
  • What are the common ISO standards related to cloud computing?
  • ISO/IEC 27001 standard
  • ISO 27017 standard
  • ISO 27018 standard
  • Summary
  • What is a SOC report?
  • Summary
  • What is the CSA STAR program?
  • STAR Level 1
  • STAR Level 2
  • Summary
  • What is PCI DSS?
  • Summary
  • What is the GDPR?
  • Summary
  • What is HIPAA?
  • Summary
  • Summary
  • Chapter 10: Engaging with Cloud Providers
  • Technical requirements
  • Choosing a cloud provider
  • What is the most suitable cloud service model for our needs?
  • Data privacy and data sovereignty
  • Auditing and monitoring
  • Migration capabilities
  • Authentication
  • Summary
  • What is a cloud provider questionnaire?
  • Summary
  • Tips for contracts with cloud providers
  • Summary.
  • Conducting penetration testing in cloud environments.