Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Cloud Security Handbook
  • Table Of Contents Toc
Cloud Security Handbook

Cloud Security Handbook - Second Edition

By : Eyal Estrin
5 (1)
close
close
Cloud Security Handbook

Cloud Security Handbook

5 (1)
By: Eyal Estrin

Overview of this book

Securing cloud resources is no easy task—each provider has its unique set of tools, processes, and challenges, demanding specialized expertise. This book cuts through the complexity, delivering practical guidance on embedding security best practices across the core infrastructure components of AWS, Azure, and GCP. It equips information security professionals and cloud engineers with the skills to identify risks and implement robust security controls throughout the design, deployment, and maintenance of public cloud environments. Starting with the shared responsibility model, cloud service models, and deployment models, this book helps you get to grips with fundamental concepts such as compute, storage, networking, identity management, and encryption. You’ll then explore common threats and compliance requirements for cloud environments. As you progress, you'll implement security strategies across deployments ranging from small-scale environments to enterprise-grade production systems, including hybrid and multi-cloud setups. This edition expands on emerging topics like GenAI service security and DevSecOps, with hands-on examples leveraging built-in security features of AWS, Azure, and GCP. By the end of this book, you'll confidently secure any cloud environment with a comprehensive understanding of cloud security principles.
Table of Contents (24 chapters)
close
close
Lock Free Chapter
1
Part 1:Securing Infrastructure Cloud Services
10
Part 2: Deep Dive into IAM, Auditing, and Encryption
14
Part 3: Threat and Vendor Management
17
Part 4: Advanced Use of Cloud Services

Index

As this ebook edition doesn't have fixed pagination, the page numbers below are for reference only, based on the printed edition of this book.

A

abuse of cloud services 297

consequences 298

detecting and mitigating, best practices 299, 300

example 298

Access Context Manager 150

access control lists (ACLs) 78, 368

access control, to CSP support engineers 219

AWS Support 219

Customer Lockbox 221, 222

Google Access Approval 223, 224

Google Access Transparency 223, 224

account creation fraud prevention (ACFP) 160

account hijacking 287

methods 287

account hijacking, in cloud services 287

consequences 287

detecting and mitigating, best practices 288, 289, 290

example 288

account takeover prevention (ATP) feature 161

Active Directory (AD) 17, 139

Active Directory Domain Services (AD DS) 102

Active Directory services

best practices 204

activity audit logs 307

AKS

CSI driver, securing...

Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Cloud Security Handbook
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon