
Empirical Cloud Security
Practical Intelligence to Evaluate Risks and Attacks
Frontmatter
Contents
Preface
About the Author
Chapter 1: Cloud Architecture and Security Fundamentals
Chapter 2: IAM for Authentication and Authorization: Security Assessment
Chapter 3: Cloud Infrastructure: Network Security Assessment
Chapter 4: Database and Storage Services: Security Assessment
Chapter 5: Design and Analysis of Cryptography Controls: Security Assessment
Chapter 6: Cloud Applications: Secure Code Review
Chapter 7: Cloud Monitoring and Logging: Security Assessment
Chapter 8: Privacy in the Cloud
Chapter 9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments
Chapter 10: Malicious Code in the Cloud
Chapter 11: Threat Intelligence and Malware Protection in the Cloud
Appendix A: List of Serverless Computing Services
Appendix B: List of Serverless Frameworks
Appendix C: List of Saas, Paas, Iaas, and Faas Providers
Appendix D: List of Containerized Services and Open Source Software
Appendix E: List of Critical RDP Vulnerabilities
Appendix F: List of Network Tools and Scripts
Appendix G: List of Databases Default TCP/UDP Ports
Appendix H: List of Database Assessment Tools, Commands, and Scripts
Appendix I: List of CouchDB API Commands and Resources
Appendix J: List of CQLSH Cassandra Database SQL Queries
Appendix K: List of Elasticsearch Queries
Appendix L: AWS Services CLI Commands
Appendix M: List of Vault and Secret Managers
Appendix N: List of TLS Security Vulnerabilities for Assessment
Appendix O: List of Cloud Logging and Monitoring Services
Appendix P: Enterprise Threat Intelligence Platforms
Index
Frontmatter
Contents
Preface
About the Author
Chapter 1: Cloud Architecture and Security Fundamentals
Chapter 2: IAM for Authentication and Authorization: Security Assessment
Chapter 3: Cloud Infrastructure: Network Security Assessment
Chapter 4: Database and Storage Services: Security Assessment
Chapter 5: Design and Analysis of Cryptography Controls: Security Assessment
Chapter 6: Cloud Applications: Secure Code Review
Chapter 7: Cloud Monitoring and Logging: Security Assessment
Chapter 8: Privacy in the Cloud
Chapter 9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments
Chapter 10: Malicious Code in the Cloud
Chapter 11: Threat Intelligence and Malware Protection in the Cloud
Appendix A: List of Serverless Computing Services
Appendix B: List of Serverless Frameworks
Appendix C: List of Saas, Paas, Iaas, and Faas Providers
Appendix D: List of Containerized Services and Open Source Software
Appendix E: List of Critical RDP Vulnerabilities
Appendix F: List of Network Tools and Scripts
Appendix G: List of Databases Default TCP/UDP Ports
Appendix H: List of Database Assessment Tools, Commands, and Scripts
Appendix I: List of CouchDB API Commands and Resources
Appendix J: List of CQLSH Cassandra Database SQL Queries
Appendix K: List of Elasticsearch Queries
Appendix L: AWS Services CLI Commands
Appendix M: List of Vault and Secret Managers
Appendix N: List of TLS Security Vulnerabilities for Assessment
Appendix O: List of Cloud Logging and Monitoring Services
Appendix P: Enterprise Threat Intelligence Platforms
Index