AWS Security Cookbook (eBook)

Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS
eBook Download: EPUB
2020
440 Seiten
Packt Publishing (Verlag)
978-1-83882-742-7 (ISBN)

Lese- und Medienproben

AWS Security Cookbook -  Kanikathottu Heartin Kanikathottu
Systemvoraussetzungen
39,49 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practices




Key Features



  • Explore useful recipes for implementing robust cloud security solutions on AWS


  • Monitor your AWS infrastructure and workloads using CloudWatch, CloudTrail, config, GuardDuty, and Macie


  • Prepare for the AWS Certified Security-Specialty exam by exploring various security models and compliance offerings



Book Description



As a security consultant, securing your infrastructure by implementing policies and following best practices is critical. This cookbook discusses practical solutions to the most common problems related to safeguarding infrastructure, covering services and features within AWS that can help you implement security models such as the CIA triad (confidentiality, integrity, and availability), and the AAA triad (authentication, authorization, and availability), along with non-repudiation.






The book begins with IAM and S3 policies and later gets you up to speed with data security, application security, monitoring, and compliance. This includes everything from using firewalls and load balancers to secure endpoints, to leveraging Cognito for managing users and authentication. Over the course of this book, you'll learn to use AWS security services such as Config for monitoring, as well as maintain compliance with GuardDuty, Macie, and Inspector. Finally, the book covers cloud security best practices and demonstrates how you can integrate additional security services such as Glacier Vault Lock and Security Hub to further strengthen your infrastructure.






By the end of this book, you'll be well versed in the techniques required for securing AWS deployments, along with having the knowledge to prepare for the AWS Certified Security - Specialty certification.




What you will learn



  • Create and manage users, groups, roles, and policies across accounts


  • Use AWS Managed Services for logging, monitoring, and auditing


  • Check compliance with AWS Managed Services that use machine learning


  • Provide security and availability for EC2 instances and applications


  • Secure data using symmetric and asymmetric encryption


  • Manage user pools and identity pools with federated login



Who this book is for



If you are an IT security professional, cloud security architect, or a cloud application developer working on security-related roles and are interested in using AWS infrastructure for secure application deployments, then this Amazon Web Services book is for you. You will also find this book useful if you're looking to achieve AWS certification. Prior knowledge of AWS and cloud computing is required to get the most out of this book.


Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practicesKey FeaturesExplore useful recipes for implementing robust cloud security solutions on AWSMonitor your AWS infrastructure and workloads using CloudWatch, CloudTrail, config, GuardDuty, and MaciePrepare for the AWS Certified Security-Specialty exam by exploring various security models and compliance offeringsBook DescriptionAs a security consultant, securing your infrastructure by implementing policies and following best practices is critical. This cookbook discusses practical solutions to the most common problems related to safeguarding infrastructure, covering services and features within AWS that can help you implement security models such as the CIA triad (confidentiality, integrity, and availability), and the AAA triad (authentication, authorization, and availability), along with non-repudiation.The book begins with IAM and S3 policies and later gets you up to speed with data security, application security, monitoring, and compliance. This includes everything from using firewalls and load balancers to secure endpoints, to leveraging Cognito for managing users and authentication. Over the course of this book, you'll learn to use AWS security services such as Config for monitoring, as well as maintain compliance with GuardDuty, Macie, and Inspector. Finally, the book covers cloud security best practices and demonstrates how you can integrate additional security services such as Glacier Vault Lock and Security Hub to further strengthen your infrastructure.By the end of this book, you'll be well versed in the techniques required for securing AWS deployments, along with having the knowledge to prepare for the AWS Certified Security - Specialty certification.What you will learnCreate and manage users, groups, roles, and policies across accountsUse AWS Managed Services for logging, monitoring, and auditingCheck compliance with AWS Managed Services that use machine learningProvide security and availability for EC2 instances and applicationsSecure data using symmetric and asymmetric encryptionManage user pools and identity pools with federated loginWho this book is forIf you are an IT security professional, cloud security architect, or a cloud application developer working on security-related roles and are interested in using AWS infrastructure for secure application deployments, then this Amazon Web Services book is for you. You will also find this book useful if you're looking to achieve AWS certification. Prior knowledge of AWS and cloud computing is required to get the most out of this book.
Erscheint lt. Verlag 27.2.2020
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Web / Internet
Schlagworte Amazon Web Services • AWS • AWS Certification • AWS Security • IT Security
ISBN-10 1-83882-742-0 / 1838827420
ISBN-13 978-1-83882-742-7 / 9781838827427
Haben Sie eine Frage zum Produkt?
EPUBEPUB (Adobe DRM)
Größe: 25,8 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90