Mastering AWS Security.:
In depth informative guide to implement and use AWS security services effectively. About This Book Learn to secure your network, infrastructure, data and applications in AWS cloud Log, monitor and audit your AWS resources for continuous security and continuous compliance in AWS cloud Use AWS managed...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing,
2017.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | In depth informative guide to implement and use AWS security services effectively. About This Book Learn to secure your network, infrastructure, data and applications in AWS cloud Log, monitor and audit your AWS resources for continuous security and continuous compliance in AWS cloud Use AWS managed security services to automate security. Focus on increasing your business rather than being diverged onto security risks and issues with AWS security. Delve deep into various aspects such as the security model, compliance, access management and much more to build and maintain a secure environment. Who This Book Is For This book is for all IT professionals, system administrators and security analysts, solution architects and Chief Information Security Officers who are responsible for securing workloads in AWS for their organizations. It is helpful for all Solutions Architects who want to design and implement secure architecture on AWS by the following security by design principle. This book is helpful for personnel in Auditors and Project Management role to understand how they can audit AWS workloads and how they can manage security in AWS respectively. If you are learning AWS or championing AWS adoption in your organization, you should read this book to build security in all your workloads. You will benefit from knowing about security footprint of all major AWS services for multiple domains, use cases, and scenarios. What You Will Learn Learn about AWS Identity Management and Access control Gain knowledge to create and secure your private network in AWS Understand and secure your infrastructure in AWS Understand monitoring, logging and auditing in AWS Ensure Data Security in AWS Learn to secure your applications in AWS Explore AWS Security best practices In Detail Mastering AWS Security starts with a deep dive into the fundamentals of the shared security responsibility model. This book tells you how you can enable continuous security, continuous auditing, and continuous compliance by automating your security in AWS with the tools, services, and features it provides. Moving on, you will learn about access control in AWS for all resources. You will also learn about the security of your network, servers, data and applications in the AWS cloud using native AWS security services. By the end of this book, you will understand the complete AWS Security landscape, covering all aspects of end - to -end software and hardware security along with logging, audit ... |
Beschreibung: | 1 online resource (247) |
ISBN: | 1788290798 9781788290791 |
Internformat
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1009064306 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 171103s2017 enk o 000 0 eng d | ||
040 | |a IDEBK |b eng |e pn |c IDEBK |d EBLCP |d NLE |d OCLCO |d MERUC |d YDX |d OCLCQ |d IDB |d OCLCQ |d WYU |d LVT |d UKAHL |d OCLCQ |d N$T |d OCLCQ |d ERF |d OCLCQ |d OCLCO |d K6U |d OCLCQ |d OCLCF |d OCLCO |d OCLCL | ||
019 | |a 1008772806 | ||
020 | |a 1788290798 |q (ebk) | ||
020 | |a 9781788290791 |q (electronic bk.) | ||
020 | |z 178829372X | ||
020 | |z 9781788293723 | ||
035 | |a (OCoLC)1009064306 |z (OCoLC)1008772806 | ||
037 | |a 1044793 |b MIL | ||
050 | 4 | |a T55.4-60.8 | |
082 | 7 | |a 004.6782 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Anthony, Albert. | |
245 | 1 | 0 | |a Mastering AWS Security. |
260 | |a Birmingham : |b Packt Publishing, |c 2017. | ||
300 | |a 1 online resource (247) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Cover -- Title Page -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Overview of Security in AWS -- Chapter overview -- AWS shared security responsibility model -- Shared responsibility model for infrastructure services -- Shared responsibility model for container services -- Shared responsibility model for abstracted services -- AWS Security responsibilities -- Physical and environmental security -- Storage device decommissioning | |
505 | 8 | |a Business continuity managementCommunication -- Network security -- Secure network architecture -- Secure access points -- Transmission protection -- Network monitoring and protection -- AWS access -- Credentials policy -- Customer security responsibilities -- AWS account security features -- AWS account -- AWS credentials -- Individual user accounts -- Secure HTTPS access points -- Security logs -- AWS Trusted Advisor security checks -- AWS Config security checks -- AWS Security services -- AWS Identity and Access Management | |
505 | 8 | |a AWS Virtual Private CloudAWS Key Management System (KMS) -- AWS Shield -- AWS Web Application Firewall (WAF) -- AWS CloudTrail -- AWS CloudWatch -- AWS Config -- AWS Artifact -- Penetration testing -- AWS Security resources -- AWS documentation -- AWS whitepapers -- AWS case studies -- AWS YouTube channel -- AWS blogs -- AWS Partner Network -- AWS Marketplace -- Summary -- Chapter 2: AWS Identity and Access Management -- Chapter overview -- IAM features and tools -- Security -- AWS account shared access -- Granular permissions | |
505 | 8 | |a Identity FederationTemporary credentials -- AWS Management Console -- AWS command line tools -- AWS SDKs -- IAM HTTPS API -- IAM Authentication -- IAM user -- IAM groups -- IAM roles -- AWS service role -- AWS SAML role -- Role for cross-account access -- Role for Web Identity Provider -- Identity Provider and Federation -- Delegation -- Temporary security credentials -- AWS Security Token Service -- The account root user -- IAM Authorization -- Permissions -- Policy -- Statement -- Effect -- Principal -- Action -- Resource | |
505 | 8 | |a ConditionCreating a new policy -- IAM Policy Simulator -- IAM Policy Validator -- Access Advisor -- Passwords Policy -- AWS credentials -- IAM limitations -- IAM best practices -- Summary -- Chapter 3: AWS Virtual Private Cloud -- Chapter overview -- VPC components -- Subnets -- Elastic Network Interfaces (ENI) -- Route tables -- Internet Gateway -- Elastic IP addresses -- VPC endpoints -- Network Address Translation (NAT) -- VPC peering -- VPC features and benefits -- Multiple connectivity options -- Secure -- Simple -- VPC use cases | |
520 | |a In depth informative guide to implement and use AWS security services effectively. About This Book Learn to secure your network, infrastructure, data and applications in AWS cloud Log, monitor and audit your AWS resources for continuous security and continuous compliance in AWS cloud Use AWS managed security services to automate security. Focus on increasing your business rather than being diverged onto security risks and issues with AWS security. Delve deep into various aspects such as the security model, compliance, access management and much more to build and maintain a secure environment. Who This Book Is For This book is for all IT professionals, system administrators and security analysts, solution architects and Chief Information Security Officers who are responsible for securing workloads in AWS for their organizations. It is helpful for all Solutions Architects who want to design and implement secure architecture on AWS by the following security by design principle. This book is helpful for personnel in Auditors and Project Management role to understand how they can audit AWS workloads and how they can manage security in AWS respectively. If you are learning AWS or championing AWS adoption in your organization, you should read this book to build security in all your workloads. You will benefit from knowing about security footprint of all major AWS services for multiple domains, use cases, and scenarios. What You Will Learn Learn about AWS Identity Management and Access control Gain knowledge to create and secure your private network in AWS Understand and secure your infrastructure in AWS Understand monitoring, logging and auditing in AWS Ensure Data Security in AWS Learn to secure your applications in AWS Explore AWS Security best practices In Detail Mastering AWS Security starts with a deep dive into the fundamentals of the shared security responsibility model. This book tells you how you can enable continuous security, continuous auditing, and continuous compliance by automating your security in AWS with the tools, services, and features it provides. Moving on, you will learn about access control in AWS for all resources. You will also learn about the security of your network, servers, data and applications in the AWS cloud using native AWS security services. By the end of this book, you will understand the complete AWS Security landscape, covering all aspects of end - to -end software and hardware security along with logging, audit ... | ||
650 | 0 | |a Cloud computing |x Security measures. | |
650 | 6 | |a Infonuagique |x Sécurité |x Mesures. | |
650 | 7 | |a Cloud computing |x Security measures |2 fast | |
758 | |i has work: |a Mastering AWS security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGDbXmhCbJ8T8hJbMJKgjy |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1637908 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH33091522 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL5115384 | ||
938 | |a EBSCOhost |b EBSC |n 1637908 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis38319541 | ||
938 | |a YBP Library Services |b YANK |n 14945940 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1009064306 |
---|---|
_version_ | 1816882405018959875 |
adam_text | |
any_adam_object | |
author | Anthony, Albert |
author_facet | Anthony, Albert |
author_role | |
author_sort | Anthony, Albert |
author_variant | a a aa |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | T55 |
callnumber-raw | T55.4-60.8 |
callnumber-search | T55.4-60.8 |
callnumber-sort | T 255.4 260.8 |
callnumber-subject | T - General Technology |
collection | ZDB-4-EBA |
contents | Cover -- Title Page -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Overview of Security in AWS -- Chapter overview -- AWS shared security responsibility model -- Shared responsibility model for infrastructure services -- Shared responsibility model for container services -- Shared responsibility model for abstracted services -- AWS Security responsibilities -- Physical and environmental security -- Storage device decommissioning Business continuity managementCommunication -- Network security -- Secure network architecture -- Secure access points -- Transmission protection -- Network monitoring and protection -- AWS access -- Credentials policy -- Customer security responsibilities -- AWS account security features -- AWS account -- AWS credentials -- Individual user accounts -- Secure HTTPS access points -- Security logs -- AWS Trusted Advisor security checks -- AWS Config security checks -- AWS Security services -- AWS Identity and Access Management AWS Virtual Private CloudAWS Key Management System (KMS) -- AWS Shield -- AWS Web Application Firewall (WAF) -- AWS CloudTrail -- AWS CloudWatch -- AWS Config -- AWS Artifact -- Penetration testing -- AWS Security resources -- AWS documentation -- AWS whitepapers -- AWS case studies -- AWS YouTube channel -- AWS blogs -- AWS Partner Network -- AWS Marketplace -- Summary -- Chapter 2: AWS Identity and Access Management -- Chapter overview -- IAM features and tools -- Security -- AWS account shared access -- Granular permissions Identity FederationTemporary credentials -- AWS Management Console -- AWS command line tools -- AWS SDKs -- IAM HTTPS API -- IAM Authentication -- IAM user -- IAM groups -- IAM roles -- AWS service role -- AWS SAML role -- Role for cross-account access -- Role for Web Identity Provider -- Identity Provider and Federation -- Delegation -- Temporary security credentials -- AWS Security Token Service -- The account root user -- IAM Authorization -- Permissions -- Policy -- Statement -- Effect -- Principal -- Action -- Resource ConditionCreating a new policy -- IAM Policy Simulator -- IAM Policy Validator -- Access Advisor -- Passwords Policy -- AWS credentials -- IAM limitations -- IAM best practices -- Summary -- Chapter 3: AWS Virtual Private Cloud -- Chapter overview -- VPC components -- Subnets -- Elastic Network Interfaces (ENI) -- Route tables -- Internet Gateway -- Elastic IP addresses -- VPC endpoints -- Network Address Translation (NAT) -- VPC peering -- VPC features and benefits -- Multiple connectivity options -- Secure -- Simple -- VPC use cases |
ctrlnum | (OCoLC)1009064306 |
dewey-full | 004.6782 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6782 |
dewey-search | 004.6782 |
dewey-sort | 14.6782 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07054cam a2200529Ma 4500</leader><controlfield tag="001">ZDB-4-EBA-on1009064306</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|||||||||</controlfield><controlfield tag="008">171103s2017 enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IDEBK</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IDEBK</subfield><subfield code="d">EBLCP</subfield><subfield code="d">NLE</subfield><subfield code="d">OCLCO</subfield><subfield code="d">MERUC</subfield><subfield code="d">YDX</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">LVT</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ERF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1008772806</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1788290798</subfield><subfield code="q">(ebk)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788290791</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">178829372X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781788293723</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1009064306</subfield><subfield code="z">(OCoLC)1008772806</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">1044793</subfield><subfield code="b">MIL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">T55.4-60.8</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.6782</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Anthony, Albert.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mastering AWS Security.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2017.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (247)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Title Page -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Overview of Security in AWS -- Chapter overview -- AWS shared security responsibility model -- Shared responsibility model for infrastructure services -- Shared responsibility model for container services -- Shared responsibility model for abstracted services -- AWS Security responsibilities -- Physical and environmental security -- Storage device decommissioning</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Business continuity managementCommunication -- Network security -- Secure network architecture -- Secure access points -- Transmission protection -- Network monitoring and protection -- AWS access -- Credentials policy -- Customer security responsibilities -- AWS account security features -- AWS account -- AWS credentials -- Individual user accounts -- Secure HTTPS access points -- Security logs -- AWS Trusted Advisor security checks -- AWS Config security checks -- AWS Security services -- AWS Identity and Access Management</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">AWS Virtual Private CloudAWS Key Management System (KMS) -- AWS Shield -- AWS Web Application Firewall (WAF) -- AWS CloudTrail -- AWS CloudWatch -- AWS Config -- AWS Artifact -- Penetration testing -- AWS Security resources -- AWS documentation -- AWS whitepapers -- AWS case studies -- AWS YouTube channel -- AWS blogs -- AWS Partner Network -- AWS Marketplace -- Summary -- Chapter 2: AWS Identity and Access Management -- Chapter overview -- IAM features and tools -- Security -- AWS account shared access -- Granular permissions</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Identity FederationTemporary credentials -- AWS Management Console -- AWS command line tools -- AWS SDKs -- IAM HTTPS API -- IAM Authentication -- IAM user -- IAM groups -- IAM roles -- AWS service role -- AWS SAML role -- Role for cross-account access -- Role for Web Identity Provider -- Identity Provider and Federation -- Delegation -- Temporary security credentials -- AWS Security Token Service -- The account root user -- IAM Authorization -- Permissions -- Policy -- Statement -- Effect -- Principal -- Action -- Resource</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">ConditionCreating a new policy -- IAM Policy Simulator -- IAM Policy Validator -- Access Advisor -- Passwords Policy -- AWS credentials -- IAM limitations -- IAM best practices -- Summary -- Chapter 3: AWS Virtual Private Cloud -- Chapter overview -- VPC components -- Subnets -- Elastic Network Interfaces (ENI) -- Route tables -- Internet Gateway -- Elastic IP addresses -- VPC endpoints -- Network Address Translation (NAT) -- VPC peering -- VPC features and benefits -- Multiple connectivity options -- Secure -- Simple -- VPC use cases</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In depth informative guide to implement and use AWS security services effectively. About This Book Learn to secure your network, infrastructure, data and applications in AWS cloud Log, monitor and audit your AWS resources for continuous security and continuous compliance in AWS cloud Use AWS managed security services to automate security. Focus on increasing your business rather than being diverged onto security risks and issues with AWS security. Delve deep into various aspects such as the security model, compliance, access management and much more to build and maintain a secure environment. Who This Book Is For This book is for all IT professionals, system administrators and security analysts, solution architects and Chief Information Security Officers who are responsible for securing workloads in AWS for their organizations. It is helpful for all Solutions Architects who want to design and implement secure architecture on AWS by the following security by design principle. This book is helpful for personnel in Auditors and Project Management role to understand how they can audit AWS workloads and how they can manage security in AWS respectively. If you are learning AWS or championing AWS adoption in your organization, you should read this book to build security in all your workloads. You will benefit from knowing about security footprint of all major AWS services for multiple domains, use cases, and scenarios. What You Will Learn Learn about AWS Identity Management and Access control Gain knowledge to create and secure your private network in AWS Understand and secure your infrastructure in AWS Understand monitoring, logging and auditing in AWS Ensure Data Security in AWS Learn to secure your applications in AWS Explore AWS Security best practices In Detail Mastering AWS Security starts with a deep dive into the fundamentals of the shared security responsibility model. This book tells you how you can enable continuous security, continuous auditing, and continuous compliance by automating your security in AWS with the tools, services, and features it provides. Moving on, you will learn about access control in AWS for all resources. You will also learn about the security of your network, servers, data and applications in the AWS cloud using native AWS security services. By the end of this book, you will understand the complete AWS Security landscape, covering all aspects of end - to -end software and hardware security along with logging, audit ...</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Infonuagique</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Mastering AWS security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGDbXmhCbJ8T8hJbMJKgjy</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1637908</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH33091522</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5115384</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1637908</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis38319541</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">14945940</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1009064306 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:28:05Z |
institution | BVB |
isbn | 1788290798 9781788290791 |
language | English |
oclc_num | 1009064306 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (247) |
psigel | ZDB-4-EBA |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Anthony, Albert. Mastering AWS Security. Birmingham : Packt Publishing, 2017. 1 online resource (247) text txt rdacontent computer c rdamedia online resource cr rdacarrier Print version record. Cover -- Title Page -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Overview of Security in AWS -- Chapter overview -- AWS shared security responsibility model -- Shared responsibility model for infrastructure services -- Shared responsibility model for container services -- Shared responsibility model for abstracted services -- AWS Security responsibilities -- Physical and environmental security -- Storage device decommissioning Business continuity managementCommunication -- Network security -- Secure network architecture -- Secure access points -- Transmission protection -- Network monitoring and protection -- AWS access -- Credentials policy -- Customer security responsibilities -- AWS account security features -- AWS account -- AWS credentials -- Individual user accounts -- Secure HTTPS access points -- Security logs -- AWS Trusted Advisor security checks -- AWS Config security checks -- AWS Security services -- AWS Identity and Access Management AWS Virtual Private CloudAWS Key Management System (KMS) -- AWS Shield -- AWS Web Application Firewall (WAF) -- AWS CloudTrail -- AWS CloudWatch -- AWS Config -- AWS Artifact -- Penetration testing -- AWS Security resources -- AWS documentation -- AWS whitepapers -- AWS case studies -- AWS YouTube channel -- AWS blogs -- AWS Partner Network -- AWS Marketplace -- Summary -- Chapter 2: AWS Identity and Access Management -- Chapter overview -- IAM features and tools -- Security -- AWS account shared access -- Granular permissions Identity FederationTemporary credentials -- AWS Management Console -- AWS command line tools -- AWS SDKs -- IAM HTTPS API -- IAM Authentication -- IAM user -- IAM groups -- IAM roles -- AWS service role -- AWS SAML role -- Role for cross-account access -- Role for Web Identity Provider -- Identity Provider and Federation -- Delegation -- Temporary security credentials -- AWS Security Token Service -- The account root user -- IAM Authorization -- Permissions -- Policy -- Statement -- Effect -- Principal -- Action -- Resource ConditionCreating a new policy -- IAM Policy Simulator -- IAM Policy Validator -- Access Advisor -- Passwords Policy -- AWS credentials -- IAM limitations -- IAM best practices -- Summary -- Chapter 3: AWS Virtual Private Cloud -- Chapter overview -- VPC components -- Subnets -- Elastic Network Interfaces (ENI) -- Route tables -- Internet Gateway -- Elastic IP addresses -- VPC endpoints -- Network Address Translation (NAT) -- VPC peering -- VPC features and benefits -- Multiple connectivity options -- Secure -- Simple -- VPC use cases In depth informative guide to implement and use AWS security services effectively. About This Book Learn to secure your network, infrastructure, data and applications in AWS cloud Log, monitor and audit your AWS resources for continuous security and continuous compliance in AWS cloud Use AWS managed security services to automate security. Focus on increasing your business rather than being diverged onto security risks and issues with AWS security. Delve deep into various aspects such as the security model, compliance, access management and much more to build and maintain a secure environment. Who This Book Is For This book is for all IT professionals, system administrators and security analysts, solution architects and Chief Information Security Officers who are responsible for securing workloads in AWS for their organizations. It is helpful for all Solutions Architects who want to design and implement secure architecture on AWS by the following security by design principle. This book is helpful for personnel in Auditors and Project Management role to understand how they can audit AWS workloads and how they can manage security in AWS respectively. If you are learning AWS or championing AWS adoption in your organization, you should read this book to build security in all your workloads. You will benefit from knowing about security footprint of all major AWS services for multiple domains, use cases, and scenarios. What You Will Learn Learn about AWS Identity Management and Access control Gain knowledge to create and secure your private network in AWS Understand and secure your infrastructure in AWS Understand monitoring, logging and auditing in AWS Ensure Data Security in AWS Learn to secure your applications in AWS Explore AWS Security best practices In Detail Mastering AWS Security starts with a deep dive into the fundamentals of the shared security responsibility model. This book tells you how you can enable continuous security, continuous auditing, and continuous compliance by automating your security in AWS with the tools, services, and features it provides. Moving on, you will learn about access control in AWS for all resources. You will also learn about the security of your network, servers, data and applications in the AWS cloud using native AWS security services. By the end of this book, you will understand the complete AWS Security landscape, covering all aspects of end - to -end software and hardware security along with logging, audit ... Cloud computing Security measures. Infonuagique Sécurité Mesures. Cloud computing Security measures fast has work: Mastering AWS security (Text) https://id.oclc.org/worldcat/entity/E39PCGDbXmhCbJ8T8hJbMJKgjy https://id.oclc.org/worldcat/ontology/hasWork FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1637908 Volltext |
spellingShingle | Anthony, Albert Mastering AWS Security. Cover -- Title Page -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Overview of Security in AWS -- Chapter overview -- AWS shared security responsibility model -- Shared responsibility model for infrastructure services -- Shared responsibility model for container services -- Shared responsibility model for abstracted services -- AWS Security responsibilities -- Physical and environmental security -- Storage device decommissioning Business continuity managementCommunication -- Network security -- Secure network architecture -- Secure access points -- Transmission protection -- Network monitoring and protection -- AWS access -- Credentials policy -- Customer security responsibilities -- AWS account security features -- AWS account -- AWS credentials -- Individual user accounts -- Secure HTTPS access points -- Security logs -- AWS Trusted Advisor security checks -- AWS Config security checks -- AWS Security services -- AWS Identity and Access Management AWS Virtual Private CloudAWS Key Management System (KMS) -- AWS Shield -- AWS Web Application Firewall (WAF) -- AWS CloudTrail -- AWS CloudWatch -- AWS Config -- AWS Artifact -- Penetration testing -- AWS Security resources -- AWS documentation -- AWS whitepapers -- AWS case studies -- AWS YouTube channel -- AWS blogs -- AWS Partner Network -- AWS Marketplace -- Summary -- Chapter 2: AWS Identity and Access Management -- Chapter overview -- IAM features and tools -- Security -- AWS account shared access -- Granular permissions Identity FederationTemporary credentials -- AWS Management Console -- AWS command line tools -- AWS SDKs -- IAM HTTPS API -- IAM Authentication -- IAM user -- IAM groups -- IAM roles -- AWS service role -- AWS SAML role -- Role for cross-account access -- Role for Web Identity Provider -- Identity Provider and Federation -- Delegation -- Temporary security credentials -- AWS Security Token Service -- The account root user -- IAM Authorization -- Permissions -- Policy -- Statement -- Effect -- Principal -- Action -- Resource ConditionCreating a new policy -- IAM Policy Simulator -- IAM Policy Validator -- Access Advisor -- Passwords Policy -- AWS credentials -- IAM limitations -- IAM best practices -- Summary -- Chapter 3: AWS Virtual Private Cloud -- Chapter overview -- VPC components -- Subnets -- Elastic Network Interfaces (ENI) -- Route tables -- Internet Gateway -- Elastic IP addresses -- VPC endpoints -- Network Address Translation (NAT) -- VPC peering -- VPC features and benefits -- Multiple connectivity options -- Secure -- Simple -- VPC use cases Cloud computing Security measures. Infonuagique Sécurité Mesures. Cloud computing Security measures fast |
title | Mastering AWS Security. |
title_auth | Mastering AWS Security. |
title_exact_search | Mastering AWS Security. |
title_full | Mastering AWS Security. |
title_fullStr | Mastering AWS Security. |
title_full_unstemmed | Mastering AWS Security. |
title_short | Mastering AWS Security. |
title_sort | mastering aws security |
topic | Cloud computing Security measures. Infonuagique Sécurité Mesures. Cloud computing Security measures fast |
topic_facet | Cloud computing Security measures. Infonuagique Sécurité Mesures. Cloud computing Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1637908 |
work_keys_str_mv | AT anthonyalbert masteringawssecurity |