Cloud Security - Quick Reference
Cloud Security - Quick Reference
About the Book
In this book we walk through threat modelling your Cloud environment. We break down and provide solid understanding of the shared responsibility model, that is: What are the CSPs responsibilities and what are your responsibilities as a consumer of the services that your chosen CSP offers. We provide a set of questions and possible answers to help you evaluate the most suitable CSP for your needs.
We discus the pros and cons of the Cloud vs In-house clouds, along with techniques for improving your understanding and implementation of the principle of least privilege in the Cloud.
The book also covers:
- Techniques and tools for storing and accessing secrets in the Cloud securely
- Risks and countermeasures of serverless offerings
- Infrastructure and configuration management techniques and tools
- An interview with Scott Piper (AWS security specialist)
- Many other tips, tricks and tools
Discounts: If you would like a discount, please email me, letting me know how much you would be willing to pay. The less you pay, the more I may consult with you about your reader experience, etc.
Homepage: https://binarymist.io/publication/cloud-security/
Authors Other Books: https://binarymist.io/publication/kims-selected-publications/
Authors Homepage: binarymist.io
Bundles that include this book
Table of Contents
-
Preface
- Description
- Purpose
- Reason
- Introduction
-
1. Asset Identification
- Productivity
- Competitive Advantage
- Control
- Data
-
2. Identify Risks
-
Shared Responsibility Model
- CSP Responsibility
- CSP Customer Responsibility
- CSP Evaluation
-
Cloud Service Provider vs In-house
- Skills
- EULA
- Giving up Secrets
- Location of Data
- Vendor lock-in
- Possible Single Points of Failure
- Review Other Chapters
- People
- Application Security
- Network Security
-
Violations of Least Privilege
- Machine Instance Single User Root
- CSP Account Single User Root
-
Storage of Secrets
-
Private Key Abuse
- SSH
- TLS
-
Credentials and Other Secrets
- Entered by People (manually)
- Entered by Software (automatically)
-
Private Key Abuse
-
Serverless
- Third Party Services
- Perimeterless
- Functions
- DoS of Lambda Functions
- Infrastructure and Configuration Management
-
AWS
- Password-less sudo
-
Shared Responsibility Model
-
3. Countermeasures
-
-
Shared Responsibility Model
- CSP Responsibility
- CSP Customer Responsibility
- CSP Evaluation
-
Cloud Service Provider vs In-house
- Skills
- EULA
- Giving up Secrets
- Location of Data
- Vendor lock-in
- Possible Single Points of Failure
- Review Other Chapters
- People
- Application Security
- Network Security
-
Violations of Least Privilege
- Machine Instance Single User Root
- CSP Account Single User Root
-
Storage of Secrets
-
Private Key Abuse
- SSH
- TLS
-
Credentials and Other Secrets
- Entered by People (manually)
- Entered by Software (automatically)
-
Private Key Abuse
-
Serverless
- Third Party Services
- Perimeterless
- Functions
- DoS of Lambda Functions
- Centralised logging of AWS Lambda Functions
- Frameworks
- Infrastructure and Configuration Management
-
AWS
- Password-less sudo
- Additional Tooling
-
Shared Responsibility Model
-
-
4. Risks that Solution Causes
- Shared Responsibility Model
- CSP Evaluation
- Cloud Service Provider vs In-house
- People
- Application Security
- Network Security
- Violations of Least Privilege
-
Storage of Secrets
-
Private Key Abuse
- SSH
- TLS
-
Credentials and Other Secrets
- Entered by People (manually)
- Entered by Software (automatically)
-
Private Key Abuse
-
Serverless
- Functions
- DoS of Lambda Functions
- Frameworks
- Infrastructure and Configuration Management
-
AWS
- Additional Tooling
-
5. Costs and Trade-offs
- Shared Responsibility Model
- CSP Evaluation
- Cloud Service Provider vs In-house
- People
- Application Security
- Network Security
- Violations of Least Privilege
-
Storage of Secrets
-
Private Key Abuse
- SSH
- TLS
-
Credentials and Other Secrets
- Entered by People (manually)
- Entered by Software (automatically)
-
Private Key Abuse
-
Serverless
- Functions
- DoS of Lambda Functions
- Frameworks
- Infrastructure and Configuration Management
-
AWS
- Additional Tooling
- Additional Resources
- Attributions
The Leanpub 60-day 100% Happiness Guarantee
Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
See full terms
Do Well. Do Good.
Authors have earned$11,714,583writing, publishing and selling on Leanpub, earning 80% royalties while saving up to 25 million pounds of CO2 and up to 46,000 trees.
Learn more about writing on Leanpub
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers), EPUB (for phones and tablets) and MOBI (for Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
Learn more about Leanpub's ebook formats and where to read them
Top Books
Recipes for Decoupling
Matthias NobackWrite software that survives
OpenIntro Statistics
David Diez, Christopher Barr, Mine Cetinkaya-Rundel, and OpenIntroA complete foundation for Statistics, also serving as a foundation for Data Science.
Leanpub revenue supports OpenIntro (US-based nonprofit) so we can provide free desk copies to teachers interested in using OpenIntro Statistics in the classroom and expand the project to support free textbooks in other subjects.
More resources: openintro.org.
C++20 - The Complete Guide
Nicolai M. JosuttisAll new language and library features of C++20 (for those who know previous C++ versions).
The book presents all new language and library features of C++20. Learn how this impacts day-to-day programming, to benefit in practice, to combine new features, and to avoid all new traps.
Buy early, pay less, free updates.
Other books:
CQRS by Example
Carlos Buenosvinos, Christian Soronellas, and Keyvan Akbary- Leverage your Software Architecture skills by learning everything about CQRS in detail with lots of examples
- Develop faster applications by applying CQRS and fostering Read Models and Projections
- Learn how to apply CQRS into a brownfield project from a pragmatic approach
Ansible for DevOps
Jeff GeerlingAnsible is a simple, but powerful, server and configuration management tool. Learn to use Ansible effectively, whether you manage one server—or thousands.
Maîtriser Apache JMeter
Philippe Mouawad, Bruno Demion (Milamber), and Antonio Gomes RodriguesToute la puissance d'Apache JMeter expliquée par ses commiteurs et utilisateurs experts. De l'intégration continue en passant par le Cloud, vous découvrirez comment intégrer JMeter à vos processus "Agile" et Devops.
If you're looking for the newer english version of this book, go to Master JMeter : From load testing to DevOps
Jetpack Compose internals
Jorge CastilloJetpack Compose is the future of Android UI. Master how it works internally and become a more efficient developer with it. You'll also find it valuable if you are not an Android dev. This book provides all the details to understand how the Compose compiler & runtime work, and how to create a client library using them.
The PowerShell Scripting and Toolmaking Book
Don Jones and Jeff HicksLearn the patterns, practices, and details of PowerShell Scripting and Toolmaking from the industry's two most recognized experts on the subject.
Mastering STM32 - Second Edition
Carmine NovielloWith more than 1200 microcontrollers, STM32 is probably the most complete ARM Cortex-M platform on the market. This book aims to be the most complete guide around introducing the reader to this exciting MCU portfolio from ST Microelectronics and its official CubeHAL and STM32CubeIDE development environment.
Introduction to Data Science
Rafael A IrizarryThe demand for skilled data science practitioners in industry, academia, and government is rapidly growing. This book introduces concepts from probability, statistical inference, linear regression and machine learning and R programming skills. Throughout the book we demonstrate how these can help you tackle real-world data analysis challenges.
Top Bundles
- #1
Software Architecture
2 Books
"Software Architecture for Developers" is a practical and pragmatic guide to modern, lightweight software architecture, specifically aimed at developers. You'll learn:The essence of software architecture.Why the software architecture role should include coding, coaching and collaboration.The things that you really need to think about before... - #2
CCIE Service Provider Ultimate Study Bundle
2 Books
Piotr Jablonski, Lukasz Bromirski, and Nick Russo have joined forces to deliver the only CCIE Service Provider training resource you'll ever need. This bundle contains a detailed and challenging collection of workbook labs, plus an extensively detailed technical reference guide. All of us have earned the CCIE Service Provider certification... - #4
Pattern-Oriented Memory Forensics and Malware Detection
2 Books
This training bundle for security engineers and researchers, malware and memory forensics analysts includes two accelerated training courses for Windows memory dump analysis using WinDbg. It is also useful for technical support and escalation engineers who analyze memory dumps from complex software environments and need to check for possible... - #6
All the Books of The Medical Futurist
6 Books
We put together the most popular books from The Medical Futurist to provide a clear picture about the major trends shaping the future of medicine and healthcare. Digital health technologies, artificial intelligence, the future of 20 medical specialties, big pharma, data privacy, digital health investments and how technology giants such as Amazon...