Cloud Security - Quick Reference
$12.00
Minimum price
$12.00
Suggested price

Cloud Security - Quick Reference

About the Book

In this book we walk through threat modelling your Cloud environment. We break down and provide solid understanding of the shared responsibility model, that is: What are the CSPs responsibilities and what are your responsibilities as a consumer of the services that your chosen CSP offers. We provide a set of questions and possible answers to help you evaluate the most suitable CSP for your needs.

We discus the pros and cons of the Cloud vs In-house clouds, along with techniques for improving your understanding and implementation of the principle of least privilege in the Cloud.

The book also covers:

  • Techniques and tools for storing and accessing secrets in the Cloud securely
  • Risks and countermeasures of serverless offerings
  • Infrastructure and configuration management techniques and tools
  • An interview with Scott Piper (AWS security specialist)
  • Many other tips, tricks and tools

Discounts: If you would like a discount, please email me, letting me know how much you would be willing to pay. The less you pay, the more I may consult with you about your reader experience, etc.

Homepage: https://binarymist.io/publication/cloud-security/

Authors Other Books: https://binarymist.io/publication/kims-selected-publications/

Authors Homepage: binarymist.io

  • Share this book

  • Categories

    • Computers and Programming
    • DevOps
    • AWS
    • Networking
    • System Integration
    • Cloud Computing
    • Amazon Web Services
    • Computer Security
  • Feedback

    Email the Author(s)

About the Author

Kim Carter
Kim Carter

Technologist / Engineer, Information Security Professional, Entrepreneur, creator of PurpleTeam, and the founder of BinaryMist Ltd. OWASP NZ Chapter Leader. Certified Scrum Master. Facilitator, mentor and motivator of cross functional, self managing teams. With a solid 20 years of commercial industry experience across many domains, Kim enjoys teaching others how to apply information security to their Agile processes, bringing the security focus up front where it's the cheapest to implement, increasing profit and reducing costs. Organiser of two information security conferences (OWASP NZ Day and Christchurch Hacker Con), International trainer, speaker, and Software Engineering Radio podcast host, focusing on:

  1. Software and network architecture
  2. Web development and engineering
  3. Information security

Kim is also a regular blog poster at binarymist.io/blog. Kim loves designing and creating robust software and networks, breaking software and networks, then fixing them and helping organisations increase productivity.

Kim's Other Books: binarymist.io/publication/kims-selected-publications/

Bundles that include this book

$21.00
Bought separately
$18.00
Bundle Price
$19.99
Bought separately
$15.00
Bundle Price

Table of Contents

  • Preface
    • Description
    • Purpose
    • Reason
  • Introduction
  • 1. Asset Identification
    • Productivity
    • Competitive Advantage
    • Control
    • Data
  • 2. Identify Risks
    • Shared Responsibility Model
      • CSP Responsibility
      • CSP Customer Responsibility
    • CSP Evaluation
    • Cloud Service Provider vs In-house
      • Skills
      • EULA
      • Giving up Secrets
      • Location of Data
      • Vendor lock-in
      • Possible Single Points of Failure
    • Review Other Chapters
    • People
    • Application Security
    • Network Security
    • Violations of Least Privilege
      • Machine Instance Single User Root
      • CSP Account Single User Root
    • Storage of Secrets
      • Private Key Abuse
        • SSH
        • TLS
      • Credentials and Other Secrets
        • Entered by People (manually)
        • Entered by Software (automatically)
    • Serverless
      • Third Party Services
      • Perimeterless
      • Functions
      • DoS of Lambda Functions
    • Infrastructure and Configuration Management
    • AWS
      • Password-less sudo
  • 3. Countermeasures
    •  
      • Shared Responsibility Model
        • CSP Responsibility
        • CSP Customer Responsibility
      • CSP Evaluation
      • Cloud Service Provider vs In-house
        • Skills
        • EULA
        • Giving up Secrets
        • Location of Data
        • Vendor lock-in
        • Possible Single Points of Failure
      • Review Other Chapters
      • People
      • Application Security
      • Network Security
      • Violations of Least Privilege
        • Machine Instance Single User Root
        • CSP Account Single User Root
      • Storage of Secrets
        • Private Key Abuse
          • SSH
          • TLS
        • Credentials and Other Secrets
          • Entered by People (manually)
          • Entered by Software (automatically)
      • Serverless
        • Third Party Services
        • Perimeterless
        • Functions
        • DoS of Lambda Functions
        • Centralised logging of AWS Lambda Functions
        • Frameworks
      • Infrastructure and Configuration Management
      • AWS
        • Password-less sudo
        • Additional Tooling
  • 4. Risks that Solution Causes
    • Shared Responsibility Model
    • CSP Evaluation
    • Cloud Service Provider vs In-house
    • People
    • Application Security
    • Network Security
    • Violations of Least Privilege
    • Storage of Secrets
      • Private Key Abuse
        • SSH
        • TLS
      • Credentials and Other Secrets
        • Entered by People (manually)
        • Entered by Software (automatically)
    • Serverless
      • Functions
      • DoS of Lambda Functions
      • Frameworks
    • Infrastructure and Configuration Management
    • AWS
      • Additional Tooling
  • 5. Costs and Trade-offs
    • Shared Responsibility Model
    • CSP Evaluation
    • Cloud Service Provider vs In-house
    • People
    • Application Security
    • Network Security
    • Violations of Least Privilege
    • Storage of Secrets
      • Private Key Abuse
        • SSH
        • TLS
      • Credentials and Other Secrets
        • Entered by People (manually)
        • Entered by Software (automatically)
    • Serverless
      • Functions
      • DoS of Lambda Functions
      • Frameworks
    • Infrastructure and Configuration Management
    • AWS
      • Additional Tooling
  • Additional Resources
  • Attributions

The Leanpub 60 Day 100% Happiness Guarantee

Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.

Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.

You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!

So, there's no reason not to click the Add to Cart button, is there?

See full terms...

Earn $8 on a $10 Purchase, and $16 on a $20 Purchase

We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.

(Yes, some authors have already earned much more than that on Leanpub.)

In fact, authors have earnedover $14 millionwriting, publishing and selling on Leanpub.

Learn more about writing on Leanpub

Free Updates. DRM Free.

If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).

Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.

Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.

Learn more about Leanpub's ebook formats and where to read them

Write and Publish on Leanpub

You can use Leanpub to easily write, publish and sell in-progress and completed ebooks and online courses!

Leanpub is a powerful platform for serious authors, combining a simple, elegant writing and publishing workflow with a store focused on selling in-progress ebooks.

Leanpub is a magical typewriter for authors: just write in plain text, and to publish your ebook, just click a button. (Or, if you are producing your ebook your own way, you can even upload your own PDF and/or EPUB files and then publish with one click!) It really is that easy.

Learn more about writing on Leanpub