dc.contributor.author |
Priyam Prashant. |
|
dc.date.accessioned |
2024-01-26T21:31:30Z |
|
dc.date.available |
2024-01-26T21:31:30Z |
|
dc.date.issued |
2018 |
|
dc.identifier.citation |
Priyam. Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack. - Birmingham: Packt Publishing, 2018 - 1 online resource (326 pages) - URL: https://libweb.kpfu.ru/ebsco/pdf/1775072.pdf |
|
dc.identifier.isbn |
9781788622196 |
|
dc.identifier.isbn |
1788622197 |
|
dc.identifier.isbn |
1788627865 |
|
dc.identifier.isbn |
9781788627863 |
|
dc.identifier.uri |
https://dspace.kpfu.ru/xmlui/handle/net/178200 |
|
dc.description |
Neutron - OpenStack network. |
|
dc.description.abstract |
In the current market, enterprise organizations are moving rapidly towards the cloud infrastructure because of its flexibility and cost effectiveness. Hence, it has become extremely important to have a security framework in place. Automating security functions will play a key role when it comes to cloud governance. This book supplies best ... |
|
dc.description.tableofcontents |
Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Cloud Security; Types of cloud; Public cloud; Private cloud; Hybrid cloud; Software as a Service; Platform as a Service; Infrastructure as a Service; Cloud security; Confidentiality; Integrity; Availability; Authentication; Authorization; Auditing; Shared responsibility model; Shared responsibility model for infrastructure ; Shared responsibility model for container service; Shared responsibility model for abstract services; Key concern areas of cloud security. |
|
dc.description.tableofcontents |
Infrastructure levelUser access level ; Storage and data level ; Application access level; Network level; Logging and monitoring level; Summary; Chapter 2: Understanding the World of Cloud Automation; What is DevOps?; Why do we need automation?; Infrastructure as Code; Configuration management; Automate deployment -- AWS OpsWorks; Quick recap; Summary; Chapter 3: Identity and Access Management in the Cloud; IAM features; How does AWS work in IAM?; Anatomy of IAM users, groups, roles, and policies ; IAM users; IAM groups; IAM roles; IAM policies; Access right delegation using IAM. |
|
dc.description.tableofcontents |
Temporary credentialsCross-account access; Identity federation; IAM best practices; Other security options in AWS; AWS Certificate Manager; WAF and Shield; Cloud hardware security module; Cognito; Amazon Macie; AWS Inspector; AWS GuardDuty; Quick recap; Summary; Chapter 4: Cloud Network Security; Virtual private cloud; NACL; Security group; VPN connection; Direct Connect; DNS security; CDN-level security; Logging and monitoring; CloudTrail; CloudWatch; Quick recap; Summary; Chapter 5: Cloud Storage and Data Security; EBS; Fault tolerance at EBS; RAID 0; RAID 1; Encryption in EBS; S3. |
|
dc.description.tableofcontents |
Security in S3AWS Glacier ; Security in AWS Glacier; EFS ; Security in EFS; Storage gateway; Security in the storage gateway; AWS Snowball; Security in Snowball; A quick recap; Summary; Chapter 6: Cloud Platform Security; RDS; Security in RDS; Using security groups; Using IAM; Using SSL to encrypt database connections; Security best practices for AWS RDS ; Back up and restore database; Monitoring of RDS; AWS Redshift ; Security in Redshift; AWS DynamoDB; Security in DynamoDB; ElastiCache ; Securing ElastiCache; VPC-level security; Authentication and access control. |
|
dc.description.tableofcontents |
Authenticating with Redis authenticationData encryption; Data-in-transit encryption; Data-at-rest encryption; AWS ECS; Securing ECS; SQS; Securing SQS; Let's have a recap; Summary; Chapter 7: Private Cloud Security; Securing hypervisor; Securing KVM; Securing XenServer; Securing ESXi; Securing compute ; IAM; Authentication; Authentication methods -- internal and external; Authorization; Policy, tokens, and domains; Federated identity; Horizon -- OpenStack dashboard service; Cinder -- OpenStack block storage; Glance -- OpenStack image storage; Manila -- OpenStack shared file storage. |
|
dc.language |
English |
|
dc.language.iso |
en |
|
dc.publisher |
Birmingham Packt Publishing |
|
dc.subject.other |
Cloud computing -- Security measures. |
|
dc.subject.other |
Computer networks -- Security measures. |
|
dc.subject.other |
Computers -- Networking -- Security. |
|
dc.subject.other |
Computers -- System Administration -- General. |
|
dc.subject.other |
Computer networking & communications. |
|
dc.subject.other |
Network security. |
|
dc.subject.other |
Computers -- Security -- General. |
|
dc.subject.other |
Computer security. |
|
dc.subject.other |
Computer networks -- Security measures. |
|
dc.subject.other |
COMPUTERS / Computer Literacy |
|
dc.subject.other |
COMPUTERS / Computer Science |
|
dc.subject.other |
COMPUTERS / Data Processing |
|
dc.subject.other |
COMPUTERS / Hardware / General |
|
dc.subject.other |
COMPUTERS / Information Technology |
|
dc.subject.other |
COMPUTERS / Machine Theory |
|
dc.subject.other |
COMPUTERS / Reference |
|
dc.subject.other |
Electronic books. |
|
dc.title |
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack. |
|
dc.type |
Book |
|
dc.description.pages |
1 online resource (326 pages) |
|
dc.collection |
Электронно-библиотечные системы |
|
dc.source.id |
EN05CEBSCO05C113 |
|