• Complain

Dotson - Practical cloud security: a guide for secure design and deployment

Here you can read online Dotson - Practical cloud security: a guide for secure design and deployment full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Beijing, year: 2019, publisher: OReilly Media, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Dotson Practical cloud security: a guide for secure design and deployment
  • Book:
    Practical cloud security: a guide for secure design and deployment
  • Author:
  • Publisher:
    OReilly Media
  • Genre:
  • Year:
    2019
  • City:
    Beijing
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Practical cloud security: a guide for secure design and deployment: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Practical cloud security: a guide for secure design and deployment" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Intro; Copyright; Table of Contents; Preface; Conventions Used in This Book; OReilly Online Learning Platform; How to Contact Us; Acknowledgments; Chapter 1. Principles and Concepts; Least Privilege; Defense in Depth; Threat Actors, Diagrams, and Trust Boundaries; Cloud Delivery Models; The Cloud Shared Responsibility Model; Risk Management; Chapter 2. Data Asset Management and Protection; Data Identification and Classification; Example Data Classification Levels; Relevant Industry or Regulatory Requirements; Data Asset Management in the Cloud; Tagging Cloud Resources

Dotson: author's other books


Who wrote Practical cloud security: a guide for secure design and deployment? Find out the surname, the name of the author of the book and a list of all author's works by series.

Practical cloud security: a guide for secure design and deployment — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Practical cloud security: a guide for secure design and deployment" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Practical Cloud Security

by Chris Dotson

Copyright 2019 Chris Dotson. All rights reserved.

Printed in the United States of America.

Published by OReilly Media, Inc. , 1005 Gravenstein Highway North, Sebastopol, CA 95472.

OReilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://oreilly.com). For more information, contact our corporate/institutional sales department: 800-998-9938 or corporate@oreilly.com .

  • Acquisitions Editor: Rachel Roumeliotis
  • Developmental Editors: Andy Oram and Nikki McDonald
  • Production Editor: Nan Barber
  • Copyeditor: Rachel Head
  • Proofreader: Amanda Kersey
  • Indexer: Judith McConville
  • Interior Designer: David Futato
  • Cover Designer: Karen Montgomery
  • Illustrator: Rebecca Demarest
  • March 2019: First Edition
Revision History for the First Edition
  • 2019-03-01: First Release

See http://oreilly.com/catalog/errata.csp?isbn=9781492037514 for release details.

The OReilly logo is a registered trademark of OReilly Media, Inc. Practical Cloud Security, the cover image, and related trade dress are trademarks of OReilly Media, Inc.

The views expressed in this work are those of the author, and do not represent the publishers views. While the publisher and the author have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the author disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk. If any code samples or other technology this work contains or describes is subject to open source licenses or the intellectual property rights of others, it is your responsibility to ensure that your use thereof complies with such licenses and/or rights.

978-1-492-03751-4

[LSI]

Preface

As the title states, this book is a practical guide to securing your cloud environments. In almost all organizations, security has to fight for time and funding, and it often takes a back seat to implementing features and functions. Focusing on the best bang for the buck, security-wise, is important.

This book is intended to help you get the most important security controls for your most important assets in place quickly and correctly, whether youre a security professional who is somewhat new to the cloud, or an architect or developer with security responsibilities. From that solid base, you can continue to build and mature your controls.

While many of the security controls and principles are similar in cloud and on-premises environments, there are some important practical differences. For that reason, a few of the recommendations for practical cloud security may be surprising to those with an on-premises security background. While there are certainly legitimate differences of opinion among security professionals in almost any area of information security, the recommendations in this book stem from years of experience in securing cloud environments, and they are informed by some of the latest developments in cloud computing offerings.

The first few chapters deal with understanding your responsibilities in the cloud and how they differ from in on-premises environments, as well as understanding what assets you have, what the most likely threats are to those assets, and some protections for them.

The next chapters of the book provide practical guidance, in priority order, of the most important security controls that you should consider first:

  • Identity and access management

  • Vulnerability management

  • Network controls

The final chapter deals with how to detect when somethings wrong and deal with it. Its a good idea to read this chapter before something actually goes wrong!

Do you need to get any certifications or attestations for your environment, like PCI certification or a SOC 2 report? If so, youll need to watch out for a few specific pitfalls, which will be noted. Youll also need to make sure youre aware of any applicable regulationsfor example, if youre handling PHI (protected health information) in the United States, or if youre handling personal information for EU citizens, regardless of where your application is hosted.

Conventions Used in This Book

The following typographical conventions are used in this book:

Italic

Indicates new terms, URLs, email addresses, filenames, and file extensions.

Constant width

Used for program listings, as well as within paragraphs to refer to program elements such as variable or function names, databases, data types, environment variables, statements, and keywords.

Constant width bold

Shows commands or other text that should be typed literally by the user.

Constant width italic

Shows text that should be replaced with user-supplied values or by values determined by context.

Tip

This element signifies a tip or suggestion.

Note

This element signifies a general note.

Warning

This element indicates a warning or caution.

OReilly Online Learning Platform
Note

For almost 40 years, OReilly Media has provided technology and business training, knowledge, and insight to help companies succeed.

Our unique network of experts and innovators share their knowledge and expertise through books, articles, conferences, and our online learning platform. OReillys online learning platform gives you on-demand access to live training courses, in-depth learning paths, interactive coding environments, and a vast collection of text and video from OReilly and 200+ other publishers. For more information, please visit http://oreilly.com.

How to Contact Us

Please address comments and questions concerning this book to the publisher:

  • OReilly Media, Inc.
  • 1005 Gravenstein Highway North
  • Sebastopol, CA 95472
  • 800-998-9938 (in the United States or Canada)
  • 707-829-0515 (international or local)
  • 707-829-0104 (fax)

We have a web page for this book, where we list errata, examples, and any additional information. You can access this page at http://bit.ly/practical-cloud-security.

To comment or ask technical questions about this book, send email to .

For more information about our books, courses, conferences, and news, see our website at http://www.oreilly.com.

Find us on Facebook: http://facebook.com/oreilly

Follow us on Twitter: http://twitter.com/oreillymedia

Watch us on YouTube: http://www.youtube.com/oreillymedia

Acknowledgments

This book would not have happened without the encouragement and support of my wonderful wife, Tabitha Dotson, who told me that I couldnt pass up this opportunity and juggled schedules and obligations for over a year to make it happen. Id also like to thank my children, Samantha (for her extensive knowledge of Greek mythology) and Molly (for constantly challenging assumptions and thinking outside the box).

It takes many people besides the author to bring a book to publication, and I didnt fully appreciate this before writing one. Id like to thank my editors, Andy Oram and Courtney Allen; my reviewers, Hans Donker, Darren Day, and Edgar Ter Danielyan; and the rest of the wonderful team at OReilly who have guided and supported me through this.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Practical cloud security: a guide for secure design and deployment»

Look at similar books to Practical cloud security: a guide for secure design and deployment. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Practical cloud security: a guide for secure design and deployment»

Discussion, reviews of the book Practical cloud security: a guide for secure design and deployment and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.