Practical Cloud Security: A Guide for Secure Design and Deployment, 2nd Edition 🔍
Chris Dotson;
O'Reilly Media, Incorporated, 2nd, 2023
英语 [en] · PDF · 5.1MB · 2023 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
描述
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-specific techniques for securing popular cloud platforms such as Amazon Web Services, Microsoft Azure, and IBM Cloud. IBM Distinguished Engineer Chris Dotson shows you how to establish data asset management, identity and access management (IAM), vulnerability management, network security, and incident response in your cloud environment. • Learn the latest threats and challenges in the cloud security space• Manage cloud providers that store or process data or deliver administrative control• Learn how standard principles and concepts--such as least privilege and defense in depth--apply in the cloud• Understand the critical role played by IAM in the cloud• Use best tactics for detecting, responding, and recovering from the most common security incidents• Manage various types of vulnerabilities, especially those common in multicloud or hybrid cloud architectures• Examine privileged access management in cloud environments This edition also covers privileged access management in cloud environments; an expanded look into applying zero trust principles; additional controls around cloud development and test environments; and up-to-date information on authentication of users and systems.
备用文件名
nexusstc/Practical Cloud Security: A Guide for Secure Design and Deployment/1e5fb77c4dade8e7ddd6c2a96c58b8fb.pdf
备用文件名
lgli/OReilly.Practical.Cloud.Security.2nd.Edition.1098148177.pdf
备用文件名
lgrsnf/OReilly.Practical.Cloud.Security.2nd.Edition.1098148177.pdf
备用文件名
zlib/Computers/Security/Chris Dotson/Practical Cloud Security: A Guide for Secure Design and Deployment, 2nd Edition_26732308.pdf
备选作者
Dotson, Chris
备用版本
United States, United States of America
备用版本
O'Reilly Media, Sebastopol, CA, 2024
元数据中的注释
Publisher's PDF
元数据中的注释
producers:
Antenna House PDF Output Library 6.2.609 (Linux64)
Antenna House PDF Output Library 6.2.609 (Linux64)
元数据中的注释
{"edition":"2","isbns":["1098148177","9781098148171"],"last_page":228,"publisher":"O'Reilly Media"}
备用描述
Cover 1
Copyright 4
Table of Contents 5
Preface 11
Who Should Read This Book 11
Navigating This Book 12
What’s New in the Second Edition 12
Conventions Used in This Book 13
O’Reilly Online Learning Platform 14
How to Contact Us 14
Acknowledgments 15
Chapter 1. Principles and Concepts 17
Least Privilege 18
Defense in Depth 18
Zero Trust 19
Threat Actors, Diagrams, and Trust Boundaries 20
Cloud Service Delivery Models 24
The Cloud Shared Responsibility Model 24
Risk Management 28
Conclusion 29
Exercises 31
Chapter 2. Data Asset Management and Protection 33
Data Identification and Classification 33
Example Data Classification Levels 34
Relevant Industry or Regulatory Requirements 35
Data Asset Management in the Cloud 37
Tagging Cloud Resources 38
Protecting Data in the Cloud 39
Tokenization 39
Encryption 40
Conclusion 47
Exercises 49
Chapter 3. Cloud Asset Management and Protection 51
Differences from Traditional IT 51
Types of Cloud Assets 52
Compute Assets 53
Storage Assets 59
Network Assets 64
Asset Management Pipeline 65
Procurement Leaks 66
Processing Leaks 67
Tooling Leaks 68
Findings Leaks 68
Tagging Cloud Assets 68
Conclusion 70
Exercises 72
Chapter 4. Identity and Access Management 73
Differences from Traditional IT 75
Life Cycle for Identity and Access 76
Request 78
Approve 78
Create, Delete, Grant, or Revoke 79
Authentication 79
Cloud IAM Identities 79
Business-to-Consumer and Business-to-Employee 80
Multi-Factor Authentication 81
Passwords, Passphrases, and API Keys 84
Shared IDs 86
Federated Identity 87
Single Sign-On 87
Instance Metadata and Identity Documents 89
Secrets Management 91
Authorization 95
Centralized Authorization 96
Roles 97
Revalidate 98
Putting It All Together in the Sample Application 101
Conclusion 103
Exercises 105
Chapter 5. Vulnerability Management 107
Differences from Traditional IT 108
Vulnerable Areas 110
Data Access 111
Application 111
Middleware 114
Operating System 115
Network 116
Virtualized Infrastructure 116
Physical Infrastructure 116
Finding and Fixing Vulnerabilities 117
Network Vulnerability Scanners 118
Agentless Scanners and Configuration Management Systems 120
Agent-Based Scanners and Configuration Management Systems 121
Cloud Workload Protection Platforms 123
Container Scanners 123
Dynamic Application Scanners (DAST) 124
Static Application Scanners (SAST) 124
Software Composition Analysis Tools (SCA) 125
Interactive Application Scanners (IAST) 125
Runtime Application Self-Protection Scanners (RASP) 125
Manual Code Reviews 126
Penetration Tests 126
User Reports 128
Example Tools for Vulnerability and Configuration Management 128
Risk Management Processes 131
Vulnerability Management Metrics 131
Tool Coverage 132
Mean Time to Remediate 132
Systems/Applications with Open Vulnerabilities 133
Percentage of False Positives 133
Percentage of False Negatives 133
Vulnerability Recurrence Rate 134
Change Management 134
Putting It All Together in the Sample Application 135
Conclusion 139
Exercises 140
Chapter 6. Network Security 141
Differences from Traditional IT 141
Concepts and Definitions 143
Zero Trust Networking 143
Allowlists and Denylists 143
DMZs 145
Proxies 145
Software-Defined Networking 146
Network Functions Virtualization 146
Overlay Networks and Encapsulation 146
Virtual Private Clouds 147
Network Address Translation 148
IPv6 149
Network Defense in Action in the Sample Application 150
Encryption in Motion 151
Firewalls and Network Segmentation 154
Allowing Administrative Access 160
Network Defense Tools 164
Egress Filtering 168
Data Loss Prevention 171
Conclusion 172
Exercises 174
Chapter 7. Detecting, Responding to, and
Recovering from Security Incidents 177
Differences from Traditional IT 178
What to Watch 179
Privileged User Access 181
Logs from Defensive Tooling 183
Cloud Service Logs and Metrics 186
Operating System Logs and Metrics 187
Middleware Logs 188
Secrets Server 188
Your Application 188
How to Watch 189
Aggregation and Retention 190
Parsing Logs 191
Searching and Correlation 192
Alerting and Automated Response 192
Security Information and Event Managers 193
Threat Hunting 195
Preparing for an Incident 195
Team 196
Plans 197
Tools 199
Responding to an Incident 201
Cyber Kill Chains and MITRE ATT&CK 201
The OODA Loop 203
Cloud Forensics 204
Blocking Unauthorized Access 205
Stopping Data Exfiltration and Command and Control 205
Recovery 205
Redeploying IT Systems 205
Notifications 206
Lessons Learned 206
Example Metrics 206
Example Tools for Detection, Response, and Recovery 207
Detection and Response in a Sample Application 208
Monitoring the Protective Systems 209
Monitoring the Application 210
Monitoring the Administrators 211
Understanding the Auditing Infrastructure 211
Conclusion 212
Exercises 214
Appendix. Exercise Solutions 215
Chapter 1 215
Chapter 2 216
Chapter 3 216
Chapter 4 217
Chapter 5 217
Chapter 6 218
Chapter 7 219
Index 221
About the Author 230
Colophon 230
Copyright 4
Table of Contents 5
Preface 11
Who Should Read This Book 11
Navigating This Book 12
What’s New in the Second Edition 12
Conventions Used in This Book 13
O’Reilly Online Learning Platform 14
How to Contact Us 14
Acknowledgments 15
Chapter 1. Principles and Concepts 17
Least Privilege 18
Defense in Depth 18
Zero Trust 19
Threat Actors, Diagrams, and Trust Boundaries 20
Cloud Service Delivery Models 24
The Cloud Shared Responsibility Model 24
Risk Management 28
Conclusion 29
Exercises 31
Chapter 2. Data Asset Management and Protection 33
Data Identification and Classification 33
Example Data Classification Levels 34
Relevant Industry or Regulatory Requirements 35
Data Asset Management in the Cloud 37
Tagging Cloud Resources 38
Protecting Data in the Cloud 39
Tokenization 39
Encryption 40
Conclusion 47
Exercises 49
Chapter 3. Cloud Asset Management and Protection 51
Differences from Traditional IT 51
Types of Cloud Assets 52
Compute Assets 53
Storage Assets 59
Network Assets 64
Asset Management Pipeline 65
Procurement Leaks 66
Processing Leaks 67
Tooling Leaks 68
Findings Leaks 68
Tagging Cloud Assets 68
Conclusion 70
Exercises 72
Chapter 4. Identity and Access Management 73
Differences from Traditional IT 75
Life Cycle for Identity and Access 76
Request 78
Approve 78
Create, Delete, Grant, or Revoke 79
Authentication 79
Cloud IAM Identities 79
Business-to-Consumer and Business-to-Employee 80
Multi-Factor Authentication 81
Passwords, Passphrases, and API Keys 84
Shared IDs 86
Federated Identity 87
Single Sign-On 87
Instance Metadata and Identity Documents 89
Secrets Management 91
Authorization 95
Centralized Authorization 96
Roles 97
Revalidate 98
Putting It All Together in the Sample Application 101
Conclusion 103
Exercises 105
Chapter 5. Vulnerability Management 107
Differences from Traditional IT 108
Vulnerable Areas 110
Data Access 111
Application 111
Middleware 114
Operating System 115
Network 116
Virtualized Infrastructure 116
Physical Infrastructure 116
Finding and Fixing Vulnerabilities 117
Network Vulnerability Scanners 118
Agentless Scanners and Configuration Management Systems 120
Agent-Based Scanners and Configuration Management Systems 121
Cloud Workload Protection Platforms 123
Container Scanners 123
Dynamic Application Scanners (DAST) 124
Static Application Scanners (SAST) 124
Software Composition Analysis Tools (SCA) 125
Interactive Application Scanners (IAST) 125
Runtime Application Self-Protection Scanners (RASP) 125
Manual Code Reviews 126
Penetration Tests 126
User Reports 128
Example Tools for Vulnerability and Configuration Management 128
Risk Management Processes 131
Vulnerability Management Metrics 131
Tool Coverage 132
Mean Time to Remediate 132
Systems/Applications with Open Vulnerabilities 133
Percentage of False Positives 133
Percentage of False Negatives 133
Vulnerability Recurrence Rate 134
Change Management 134
Putting It All Together in the Sample Application 135
Conclusion 139
Exercises 140
Chapter 6. Network Security 141
Differences from Traditional IT 141
Concepts and Definitions 143
Zero Trust Networking 143
Allowlists and Denylists 143
DMZs 145
Proxies 145
Software-Defined Networking 146
Network Functions Virtualization 146
Overlay Networks and Encapsulation 146
Virtual Private Clouds 147
Network Address Translation 148
IPv6 149
Network Defense in Action in the Sample Application 150
Encryption in Motion 151
Firewalls and Network Segmentation 154
Allowing Administrative Access 160
Network Defense Tools 164
Egress Filtering 168
Data Loss Prevention 171
Conclusion 172
Exercises 174
Chapter 7. Detecting, Responding to, and
Recovering from Security Incidents 177
Differences from Traditional IT 178
What to Watch 179
Privileged User Access 181
Logs from Defensive Tooling 183
Cloud Service Logs and Metrics 186
Operating System Logs and Metrics 187
Middleware Logs 188
Secrets Server 188
Your Application 188
How to Watch 189
Aggregation and Retention 190
Parsing Logs 191
Searching and Correlation 192
Alerting and Automated Response 192
Security Information and Event Managers 193
Threat Hunting 195
Preparing for an Incident 195
Team 196
Plans 197
Tools 199
Responding to an Incident 201
Cyber Kill Chains and MITRE ATT&CK 201
The OODA Loop 203
Cloud Forensics 204
Blocking Unauthorized Access 205
Stopping Data Exfiltration and Command and Control 205
Recovery 205
Redeploying IT Systems 205
Notifications 206
Lessons Learned 206
Example Metrics 206
Example Tools for Detection, Response, and Recovery 207
Detection and Response in a Sample Application 208
Monitoring the Protective Systems 209
Monitoring the Application 210
Monitoring the Administrators 211
Understanding the Auditing Infrastructure 211
Conclusion 212
Exercises 214
Appendix. Exercise Solutions 215
Chapter 1 215
Chapter 2 216
Chapter 3 216
Chapter 4 217
Chapter 5 217
Chapter 6 218
Chapter 7 219
Index 221
About the Author 230
Colophon 230
开源日期
2023-10-31
We strongly recommend that you support the author by buying or donating on their personal website, or borrowing in your local library.
🚀 快速下载
成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。
🐢 低速下载
由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)
- 低速服务器(合作方提供) #1 (稍快但需要排队)
- 低速服务器(合作方提供) #2 (稍快但需要排队)
- 低速服务器(合作方提供) #3 (稍快但需要排队)
- 低速服务器(合作方提供) #4 (稍快但需要排队)
- 低速服务器(合作方提供) #5 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #6 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #7 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #8 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #9 (无需排队,但可能非常慢)
- 下载后: 在我们的查看器中打开
所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
外部下载
-
对于大文件,我们建议使用下载管理器以防止中断。
推荐的下载管理器:JDownloader -
您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
推荐的电子书阅读器:Anna的档案在线查看器、ReadEra和Calibre -
使用在线工具进行格式转换。
推荐的转换工具:CloudConvert和PrintFriendly -
您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
推荐的工具:亚马逊的“发送到 Kindle”和djazz 的“发送到 Kobo/Kindle” -
支持作者和图书馆
✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。
下面的文字仅以英文继续。
总下载量:
“文件的MD5”是根据文件内容计算出的哈希值,并且基于该内容具有相当的唯一性。我们这里索引的所有影子图书馆都主要使用MD5来标识文件。
一个文件可能会出现在多个影子图书馆中。有关我们编译的各种数据集的信息,请参见数据集页面。
有关此文件的详细信息,请查看其JSON 文件。 Live/debug JSON version. Live/debug page.