About the Book
In this book we walk through threat modelling your Cloud environment. We break down and provide solid understanding of the shared responsibility model, that is: What are the CSPs responsibilities and what are your responsibilities as a consumer of the services that your chosen CSP offers. We provide a set of questions and possible answers to help you evaluate the most suitable CSP for your needs.
We discus the pros and cons of the Cloud vs In-house clouds, along with techniques for improving your understanding and implementation of the principle of least privilege in the Cloud.
The book also covers:
- Techniques and tools for storing and accessing secrets in the Cloud securely
- Risks and countermeasures of serverless offerings
- Infrastructure and configuration management techniques and tools
- An interview with Scott Piper (AWS security specialist)
- Many other tips, tricks and tools
Discounts: If you would like a discount, please email me, letting me know how much you would be willing to pay. The less you pay, the more I may consult with you about your reader experience, etc.
Authors Other Books: https://binarymist.io/publication/kims-selected-publications/
Authors Homepage: binarymist.io
About the Author
Technologist / Engineer, Information Security Professional, Entrepreneur and the founder of BinaryMist Ltd. OWASP NZ Chapter Leader. Certified Scrum Master. Facilitator, mentor and motivator of cross functional, self managing teams. With a solid 18 years of commercial industry experience across many domains, Kim enjoys teaching others how to apply information security to their Agile processes, bringing the security focus up front where it's the cheapest to implement, increasing profit and reducing costs. Organiser of two information security conferences (OWASP NZ Day and Christchurch Hacker Con), International trainer, speaker, and Software Engineering Radio podcast host, focusing on:
- Software and network architecture
- Web development and engineering
- Information security
Kim is also a regular blog poster at binarymist.blog. Kim loves designing and creating robust software and networks, breaking software and networks, then fixing them and helping organisations increase productivity.