Показать сокращенную информацию
dc.contributor.author | Priyam Prashant. | |
dc.date.accessioned | 2024-01-26T21:31:30Z | |
dc.date.available | 2024-01-26T21:31:30Z | |
dc.date.issued | 2018 | |
dc.identifier.citation | Priyam. Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack. - Birmingham: Packt Publishing, 2018 - 1 online resource (326 pages) - URL: https://libweb.kpfu.ru/ebsco/pdf/1775072.pdf | |
dc.identifier.isbn | 9781788622196 | |
dc.identifier.isbn | 1788622197 | |
dc.identifier.isbn | 1788627865 | |
dc.identifier.isbn | 9781788627863 | |
dc.identifier.uri | https://dspace.kpfu.ru/xmlui/handle/net/178200 | |
dc.description | Neutron - OpenStack network. | |
dc.description.abstract | In the current market, enterprise organizations are moving rapidly towards the cloud infrastructure because of its flexibility and cost effectiveness. Hence, it has become extremely important to have a security framework in place. Automating security functions will play a key role when it comes to cloud governance. This book supplies best ... | |
dc.description.tableofcontents | Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Cloud Security; Types of cloud; Public cloud; Private cloud; Hybrid cloud; Software as a Service; Platform as a Service; Infrastructure as a Service; Cloud security; Confidentiality; Integrity; Availability; Authentication; Authorization; Auditing; Shared responsibility model; Shared responsibility model for infrastructure ; Shared responsibility model for container service; Shared responsibility model for abstract services; Key concern areas of cloud security. | |
dc.description.tableofcontents | Infrastructure levelUser access level ; Storage and data level ; Application access level; Network level; Logging and monitoring level; Summary; Chapter 2: Understanding the World of Cloud Automation; What is DevOps?; Why do we need automation?; Infrastructure as Code; Configuration management; Automate deployment -- AWS OpsWorks; Quick recap; Summary; Chapter 3: Identity and Access Management in the Cloud; IAM features; How does AWS work in IAM?; Anatomy of IAM users, groups, roles, and policies ; IAM users; IAM groups; IAM roles; IAM policies; Access right delegation using IAM. | |
dc.description.tableofcontents | Temporary credentialsCross-account access; Identity federation; IAM best practices; Other security options in AWS; AWS Certificate Manager; WAF and Shield; Cloud hardware security module; Cognito; Amazon Macie; AWS Inspector; AWS GuardDuty; Quick recap; Summary; Chapter 4: Cloud Network Security; Virtual private cloud; NACL; Security group; VPN connection; Direct Connect; DNS security; CDN-level security; Logging and monitoring; CloudTrail; CloudWatch; Quick recap; Summary; Chapter 5: Cloud Storage and Data Security; EBS; Fault tolerance at EBS; RAID 0; RAID 1; Encryption in EBS; S3. | |
dc.description.tableofcontents | Security in S3AWS Glacier ; Security in AWS Glacier; EFS ; Security in EFS; Storage gateway; Security in the storage gateway; AWS Snowball; Security in Snowball; A quick recap; Summary; Chapter 6: Cloud Platform Security; RDS; Security in RDS; Using security groups; Using IAM; Using SSL to encrypt database connections; Security best practices for AWS RDS ; Back up and restore database; Monitoring of RDS; AWS Redshift ; Security in Redshift; AWS DynamoDB; Security in DynamoDB; ElastiCache ; Securing ElastiCache; VPC-level security; Authentication and access control. | |
dc.description.tableofcontents | Authenticating with Redis authenticationData encryption; Data-in-transit encryption; Data-at-rest encryption; AWS ECS; Securing ECS; SQS; Securing SQS; Let's have a recap; Summary; Chapter 7: Private Cloud Security; Securing hypervisor; Securing KVM; Securing XenServer; Securing ESXi; Securing compute ; IAM; Authentication; Authentication methods -- internal and external; Authorization; Policy, tokens, and domains; Federated identity; Horizon -- OpenStack dashboard service; Cinder -- OpenStack block storage; Glance -- OpenStack image storage; Manila -- OpenStack shared file storage. | |
dc.language | English | |
dc.language.iso | en | |
dc.publisher | Birmingham Packt Publishing | |
dc.subject.other | Cloud computing -- Security measures. | |
dc.subject.other | Computer networks -- Security measures. | |
dc.subject.other | Computers -- Networking -- Security. | |
dc.subject.other | Computers -- System Administration -- General. | |
dc.subject.other | Computer networking & communications. | |
dc.subject.other | Network security. | |
dc.subject.other | Computers -- Security -- General. | |
dc.subject.other | Computer security. | |
dc.subject.other | Computer networks -- Security measures. | |
dc.subject.other | COMPUTERS / Computer Literacy | |
dc.subject.other | COMPUTERS / Computer Science | |
dc.subject.other | COMPUTERS / Data Processing | |
dc.subject.other | COMPUTERS / Hardware / General | |
dc.subject.other | COMPUTERS / Information Technology | |
dc.subject.other | COMPUTERS / Machine Theory | |
dc.subject.other | COMPUTERS / Reference | |
dc.subject.other | Electronic books. | |
dc.title | Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack. | |
dc.type | Book | |
dc.description.pages | 1 online resource (326 pages) | |
dc.collection | Электронно-библиотечные системы | |
dc.source.id | EN05CEBSCO05C113 |