Empirical Cloud Security's Cover Image
Requires Authorization

Empirical Cloud Security

Practical Intelligence to Evaluate Risks and Attacks

  
Cite
Download Cover
Frontmatter
CONTENTS
PREFACE
ACKNOWLEDGMENTS
ABOUT THE AUTHOR
CHAPTER 1 CLOUD ARCHITECTURE AND SECURITY FUNDAMENTALS
CHAPTER 2 IAM FOR AUTHENTICATION AND AUTHORIZATION: SECURITY ASSESSMENT
CHAPTER 3 CLOUD INFRASTRUCTURE: NETWORK SECURITY ASSESSMENT
CHAPTER 4 DATABASE AND STORAGE SERVICES: SECURITY ASSESSMENT
CHAPTER 5 DESIGN AND ANALYSIS OF CRYPTOGRAPHY CONTROLS: SECURITY ASSESSMENT
CHAPTER 6 CLOUD APPLICATIONS: SECURE CODE REVIEW
CHAPTER 7 CLOUD MONITORING AND LOGGING: SECURITY ASSESSMENT
CHAPTER 8 PRIVACY IN THE CLOUD
CHAPTER 9 CLOUD SECURITY AND PRIVACY: FLAWS, ATTACKS, AND IMPACT ASSESSMENTS
CHAPTER 10 MALICIOUS CODE IN THE CLOUD
CHAPTER 11 THREAT INTELLIGENCE AND MALWARE PROTECTION IN THE CLOUD
CONCLUSION
APPENDIX A LIST OF SERVERLESS COMPUTING SERVICE
APPENDIX B LIST OF SERVERLESS FRAMEWORKS
APPENDIX C LIST OF SAAS, PAAS, IAAS, AND FAAS PROVIDERS
APPENDIX D LIST OF CONTAINERIZED SERVICES AND OPEN SOURCE SOFTWARE
APPENDIX E LIST OF CRITICAL RDP VULNERABILITIES
APPENDIX F LIST OF NETWORK TOOLS AND SCRIPTS
APPENDIX G LIST OF DATABASES DEFAULT TCP/UDP PORTS
APPENDIX H LIST OF DATABASE ASSESSMENT TOOLS, COMMANDS, AND SCRIPTS
APPENDIX I LIST OF COUCHDB API COMMANDS AND RESOURCES
APPENDIX J LIST OF CQLSH CASSANDRA DATABASE SQL QUERIES
APPENDIX K LIST OF ELASTICSEARCH QUERIES
APPENDIX L AWS SERVICES CLI COMMANDS
APPENDIX M LIST OF VAULT AND SECRET MANAGERS
APPENDIX N LIST OF TLS SECURITY VULNERABILITIES FOR ASSESSMENT
APPENDIX O LIST OF CLOUD LOGGING AND MONITORING SERVICES
INDEX
Frontmatter
CONTENTS
PREFACE
ACKNOWLEDGMENTS
ABOUT THE AUTHOR
CHAPTER 1 CLOUD ARCHITECTURE AND SECURITY FUNDAMENTALS
CHAPTER 2 IAM FOR AUTHENTICATION AND AUTHORIZATION: SECURITY ASSESSMENT
CHAPTER 3 CLOUD INFRASTRUCTURE: NETWORK SECURITY ASSESSMENT
CHAPTER 4 DATABASE AND STORAGE SERVICES: SECURITY ASSESSMENT
CHAPTER 5 DESIGN AND ANALYSIS OF CRYPTOGRAPHY CONTROLS: SECURITY ASSESSMENT
CHAPTER 6 CLOUD APPLICATIONS: SECURE CODE REVIEW
CHAPTER 7 CLOUD MONITORING AND LOGGING: SECURITY ASSESSMENT
CHAPTER 8 PRIVACY IN THE CLOUD
CHAPTER 9 CLOUD SECURITY AND PRIVACY: FLAWS, ATTACKS, AND IMPACT ASSESSMENTS
CHAPTER 10 MALICIOUS CODE IN THE CLOUD
CHAPTER 11 THREAT INTELLIGENCE AND MALWARE PROTECTION IN THE CLOUD
CONCLUSION
APPENDIX A LIST OF SERVERLESS COMPUTING SERVICE
APPENDIX B LIST OF SERVERLESS FRAMEWORKS
APPENDIX C LIST OF SAAS, PAAS, IAAS, AND FAAS PROVIDERS
APPENDIX D LIST OF CONTAINERIZED SERVICES AND OPEN SOURCE SOFTWARE
APPENDIX E LIST OF CRITICAL RDP VULNERABILITIES
APPENDIX F LIST OF NETWORK TOOLS AND SCRIPTS
APPENDIX G LIST OF DATABASES DEFAULT TCP/UDP PORTS
APPENDIX H LIST OF DATABASE ASSESSMENT TOOLS, COMMANDS, AND SCRIPTS
APPENDIX I LIST OF COUCHDB API COMMANDS AND RESOURCES
APPENDIX J LIST OF CQLSH CASSANDRA DATABASE SQL QUERIES
APPENDIX K LIST OF ELASTICSEARCH QUERIES
APPENDIX L AWS SERVICES CLI COMMANDS
APPENDIX M LIST OF VAULT AND SECRET MANAGERS
APPENDIX N LIST OF TLS SECURITY VULNERABILITIES FOR ASSESSMENT
APPENDIX O LIST OF CLOUD LOGGING AND MONITORING SERVICES
INDEX
Published:
Apr 2021
Language:
English
Pages:
444
PDF
ISBN: 978-1-68392-684-9
Published:
Apr 2021
E-Pub
ISBN: 978-1-68392-683-2
Published:
Apr 2021

People Also Read