Cloud Security - Quick Reference
Cloud Security - Quick Reference
$12.00
Minimum price
$12.00
Suggested price
Cloud Security - Quick Reference

This book is 100% complete

Completed on 2018-09-07

About the Book

In this book we walk through threat modelling your Cloud environment. We break down and provide solid understanding of the shared responsibility model, that is: What are the CSPs responsibilities and what are your responsibilities as a consumer of the services that your chosen CSP offers. We provide a set of questions and possible answers to help you evaluate the most suitable CSP for your needs.

We discus the pros and cons of the Cloud vs In-house clouds, along with techniques for improving your understanding and implementation of the principle of least privilege in the Cloud.

The book also covers:

  • Techniques and tools for storing and accessing secrets in the Cloud securely
  • Risks and countermeasures of serverless offerings
  • Infrastructure and configuration management techniques and tools
  • An interview with Scott Piper (AWS security specialist)
  • Many other tips, tricks and tools

Discounts: If you would like a discount, please email me, letting me know how much you would be willing to pay. The less you pay, the more I may consult with you about your reader experience, etc.

Homepage: https://binarymist.io/publication/cloud-security/

Authors Other Books: https://binarymist.io/publication/kims-selected-publications/

Authors Homepage: binarymist.io

Table of Contents

  • Preface
    • Description
    • Purpose
    • Reason
  • Introduction
  • 1. Asset Identification
    • Productivity
    • Competitive Advantage
    • Control
    • Data
  • 2. Identify Risks
    • Shared Responsibility Model
      • CSP Responsibility
      • CSP Customer Responsibility
    • CSP Evaluation
    • Cloud Service Provider vs In-house
      • Skills
      • EULA
      • Giving up Secrets
      • Location of Data
      • Vendor lock-in
      • Possible Single Points of Failure
    • Review Other Chapters
    • People
    • Application Security
    • Network Security
    • Violations of Least Privilege
      • Machine Instance Single User Root
      • CSP Account Single User Root
    • Storage of Secrets
      • Private Key Abuse
        • SSH
        • TLS
      • Credentials and Other Secrets
        • Entered by People (manually)
        • Entered by Software (automatically)
    • Serverless
      • Third Party Services
      • Perimeterless
      • Functions
      • DoS of Lambda Functions
    • Infrastructure and Configuration Management
    • AWS
      • Password-less sudo
  • 3. Countermeasures
    •  
      • Shared Responsibility Model
        • CSP Responsibility
        • CSP Customer Responsibility
      • CSP Evaluation
      • Cloud Service Provider vs In-house
        • Skills
        • EULA
        • Giving up Secrets
        • Location of Data
        • Vendor lock-in
        • Possible Single Points of Failure
      • Review Other Chapters
      • People
      • Application Security
      • Network Security
      • Violations of Least Privilege
        • Machine Instance Single User Root
        • CSP Account Single User Root
      • Storage of Secrets
        • Private Key Abuse
          • SSH
          • TLS
        • Credentials and Other Secrets
          • Entered by People (manually)
          • Entered by Software (automatically)
      • Serverless
        • Third Party Services
        • Perimeterless
        • Functions
        • DoS of Lambda Functions
        • Centralised logging of AWS Lambda Functions
        • Frameworks
      • Infrastructure and Configuration Management
      • AWS
        • Password-less sudo
        • Additional Tooling
  • 4. Risks that Solution Causes
    • Shared Responsibility Model
    • CSP Evaluation
    • Cloud Service Provider vs In-house
    • People
    • Application Security
    • Network Security
    • Violations of Least Privilege
    • Storage of Secrets
      • Private Key Abuse
        • SSH
        • TLS
      • Credentials and Other Secrets
        • Entered by People (manually)
        • Entered by Software (automatically)
    • Serverless
      • Functions
      • DoS of Lambda Functions
      • Frameworks
    • Infrastructure and Configuration Management
    • AWS
      • Additional Tooling
  • 5. Costs and Trade-offs
    • Shared Responsibility Model
    • CSP Evaluation
    • Cloud Service Provider vs In-house
    • People
    • Application Security
    • Network Security
    • Violations of Least Privilege
    • Storage of Secrets
      • Private Key Abuse
        • SSH
        • TLS
      • Credentials and Other Secrets
        • Entered by People (manually)
        • Entered by Software (automatically)
    • Serverless
      • Functions
      • DoS of Lambda Functions
      • Frameworks
    • Infrastructure and Configuration Management
    • AWS
      • Additional Tooling
  • Additional Resources
  • Attributions

Bundles that include this book

Docker Security - Quick Reference
Cloud Security - Quick Reference
2 Books
$21.00
Suggested Price
$18.00
Bundle Price
Cloud Security - Quick Reference
An Introduction to Cloud Development and Engineering
2 Books
$20.99
Suggested Price
$15.00
Bundle Price

About the Author

Kim Carter
Kim Carter

Technologist / Engineer, Information Security Professional, Entrepreneur and the founder of BinaryMist Ltd. OWASP NZ Chapter Leader. Certified Scrum Master. Facilitator, mentor and motivator of cross functional, self managing teams. With a solid 16 years of commercial industry experience across many domains, Kim enjoys teaching others how to apply information security to their Agile processes, bringing the security focus up front where it's the cheapest to implement, increasing profit and reducing costs. Organiser of two information security conferences (OWASP NZ Day and Christchurch Hacker Con), International trainer, speaker, and Software Engineering Radio podcast host, focusing on:

  1. Software and network architecture
  2. Web development and engineering
  3. Information security

Kim is also a regular blog poster at binarymist.io/blog. Kim loves designing and creating robust software and networks, breaking software and networks, then fixing them and helping organisations increase productivity.

Kim's Other Books: binarymist.io/publication/kims-selected-publications/

The Leanpub 45-day 100% Happiness Guarantee

Within 45 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.

See full terms...

Write and Publish on Leanpub

Authors and publishers use Leanpub to publish amazing in-progress and completed ebooks, just like this one. You can use Leanpub to write, publish and sell your book as well! Leanpub is a powerful platform for serious authors, combining a simple, elegant writing and publishing workflow with a store focused on selling in-progress ebooks. Leanpub is a magical typewriter for authors: just write in plain text, and to publish your ebook, just click a button. It really is that easy.

Learn more about writing on Leanpub