Cloud Native Security Cookbook
by Josh Armitage
Copyright 2022 Joshua Hagen Armitage. All rights reserved.
Printed in the United States of America.
Published by OReilly Media, Inc. , 1005 Gravenstein Highway North, Sebastopol, CA 95472.
OReilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://oreilly.com). For more information, contact our corporate/institutional sales department: 800-998-9938 or corporate@oreilly.com .
- Acquisitions Editor: Jennifer Pollock
- Development Editor: Corbin Collins
- Production Editor: Jonathon Owen
- Copyeditor: Sonia Saruba
- Proofreader: Piper Editorial Consulting, LLC
- Indexer: Judith McConville
- Interior Designer: David Futato
- Cover Designer: Karen Montgomery
- Illustrator: Kate Dullea
- April 2022: First Edition
Revision History for the First Edition
- 2022-04-20: First Release
See http://oreilly.com/catalog/errata.csp?isbn=9781098106300 for release details.
The OReilly logo is a registered trademark of OReilly Media, Inc. Cloud Native Security Cookbook, the cover image, and related trade dress are trademarks of OReilly Media, Inc.
The views expressed in this work are those of the author and do not represent the publishers views. While the publisher and the author have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the author disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk. If any code samples or other technology this work contains or describes is subject to open source licenses or the intellectual property rights of others, it is your responsibility to ensure that your use thereof complies with such licenses and/or rights.
This work is part of a collaboration between OReilly and Palo Alto Networks. See our statement of editorial independence.
978-1-098-10630-0
[LSI]
Preface
In the early 2000s, public cloud emerged as a new a paradigm that revolutionized how technology is consumed across the world. Rather than waiting weeks to months for new computers to be ordered, delivered, and racked, access to machines is mere seconds away. The company bringing you one-click shopping was now bringing you one-click computing.
In my first job out of university, I was working in the mainframe division of IBM, building a cloud-delivered virtualized mainframe environment. We were looking to bring DevOps to the worlds most venerated enterprises. What became a focus of the customer conversations over time was security. How can they be assured that their data is safe when they upload it to the cloud?
When the cloud was making waves in even the most risk-averse industries, I became convinced that it was the way forward for businesses looking to excel in the digital age.
Since IBM, I have spent the majority of my time working as a consultant in Australia and the UK, focused on helping start-ups and enterprises alike use the cloud as their innovation engine, empowering their developers to deliver exceptional outcomes.
Through my experience I have seen many false steps, patterns, and anti-patterns that reappear as businesses and engineers make their first forays into a cloud-native world. This book is focused on how to use the cloud securely.
The recipes in this book show you how to build a secure foundation in your cloud environment and how to leverage the first-party security solutions to stay on top of your estate as it organically scales.
Who This Book Is For
This book is about getting hands-on with the cloud. Each recipe comes with a fully worked solution in Terraform, the most widely used infrastructure-as-code tool.
For each problem presented, there is a recipe for each of the three primary cloud providers, Amazon Web Services, Microsoft Azure, and Google Cloud Platform. As the modern world is becoming increasingly multi-cloud, it is ever more valuable to be cloud multilingual.
Although the three clouds have significant overlap in the services they provide, the design decisions that went into the cloud itself have massive ramifications for security. With this book youll become empowered to translate between the three clouds and rapidly solve problems wherever they present.
How This Book Is Organized
This book has nine chapters of recipes, each focused on a particular theme. These range from how to structure your estate and manage users to how to ensure compliance at scale to the intricacies of identity and access management on each cloud provider.
What You Need to Use This Book
In order to complete the recipes in this book, you will need access to your cloud of choice. Depending on the recipe, you will need highly privileged credentials to make the required changes.
All the recipes were developed using Terraform version 1.0. If you have not used Terraform before, then going through will show you how to safely authenticate against your cloud.
Conventions Used in This Book
The following typographical conventions are used in this book:
ItalicIndicates new terms, URLs, email addresses, filenames, and file extensions.
Constant width
Used for program listings, as well as within paragraphs to refer to program elements such as variable or function names, databases, data types, environment variables, statements, and keywords.
Constant width bold
Shows commands or other text that should be typed literally by the user.
Constant width italic
Shows text that should be replaced with user-supplied values or by values determined by context.
Note
This element signifies a general note.
Warning
This element indicates a warning or caution.
Using Code Examples
Supplemental material (code examples, exercises, etc.) is available for download at https://github.com/Armitagency/cloud-native-security-cookbook-tf.
If you have a technical question or a problem using the code examples, please send email to .
This book is here to help you get your job done. In general, if example code is offered with this book, you may use it in your programs and documentation. You do not need to contact us for permission unless youre reproducing a significant portion of the code. For example, writing a program that uses several chunks of code from this book does not require permission. Selling or distributing examples from OReilly books does require permission. Answering a question by citing this book and quoting example code does not require permission. Incorporating a significant amount of example code from this book into your products documentation does require permission.
We appreciate, but generally do not require, attribution. An attribution usually includes the title, author, publisher, and ISBN. For example: "Cloud Native Security Cookbook by Josh Armitage (OReilly). Copyright 2022 Joshua Hagen Armitage, 978-1-098-10630-0.
If you feel your use of code examples falls outside fair use or the permission given above, feel free to contact us at .
OReilly Online Learning
Note
For more than 40 years, OReilly Media has provided technology and business training, knowledge, and insight to help companies succeed.