Book Image

Cloud Security Automation

By : Prashant Priyam
Book Image

Cloud Security Automation

By: Prashant Priyam

Overview of this book

Security issues are still a major concern for all IT organizations. For many enterprises, the move to cloud computing has raised concerns for security, but when applications are architected with focus on security, cloud platforms can be made just as secure as on-premises platforms. Cloud instances can be kept secure by employing security automation that helps make your data meet your organization's security policy. This book starts with the basics of why cloud security is important and how automation can be the most effective way of controlling cloud security. You will then delve deeper into the AWS cloud environment and its security services by dealing with security functions such as Identity and Access Management and will also learn how these services can be automated. Moving forward, you will come across aspects such as cloud storage and data security, automating cloud deployments, and so on. Then, you'll work with OpenStack security modules and learn how private cloud security functions can be automated for better time- and cost-effectiveness. Toward the end of the book, you will gain an understanding of the security compliance requirements for your Cloud. By the end of this book, you will have hands-on experience of automating your cloud security and governance.
Table of Contents (15 chapters)
Title Page
Packt Upsell

AWS Glacier 

AWS Glacier is an archival solution, where we store data that is not accessed frequently. You can use it to transfer data directly from S3 using a life cycle policy. 

In AWS Glacier, you can store a file with a maximum size of 40 TB. It also has unlimited storage, like S3, where you can store unlimited files and an unlimited volume of data.

Security in AWS Glacier

In AWS, Glacier stores data into a vault. It's only accessible to the users who created the vault. All the data stored Glaciers are encrypted, and they also support data in transit encryption using SSL.

Any data stored in the Glacier vault is immutable. This means that data stored in a Glacier cannot be updated. For access control and management you can use IAM policies. 

To add more security, you can use request signing, whereas to authenticate requests, you need to sign your request using hash keys. A cryptographic hash is a function that returns a unique hash value based on the input. In input, we pass secret access...