A complete guide to securing the core components of cloud services, with practical, real-world examples using the built-in security features of Azure, AWS, and GCP
Key Features
Discover hands-on techniques for implementing robust cloud security implementation
Protect your data and cloud infrastructure with tailored security strategies for your business
Learn how to implement DevSecOps, apply encryption, detect threats and misconfigurations, and maintain cloud compliance
Purchase of the print or Kindle book includes a free PDF eBook
Book DescriptionSecuring cloud resources is no easy task-each provider has its unique set of tools, processes, and challenges, demanding specialized expertise. This book cuts through the complexity, delivering practical guidance on embedding security best practices across the core infrastructure components of AWS, Azure, and GCP. It equips information security professionals and cloud engineers with the skills to identify risks and implement robust security controls throughout the design, deployment, and maintenance of public cloud environments.
Starting with the shared responsibility model, cloud service models, and deployment models, this book helps you get to grips with fundamental concepts such as compute, storage, networking, identity management, and encryption. You'll then explore common threats and compliance requirements for cloud environments. As you progress, you'll implement security strategies across deployments ranging from small-scale environments to enterprise-grade production systems, including hybrid and multi-cloud setups.
This edition expands on emerging topics like GenAI service security and DevSecOps, with hands-on examples leveraging built-in security features of AWS, Azure, and GCP.
By the end of this book, you'll confidently secure any cloud environment with a comprehensive understanding of cloud security principles.What you will learn
Grasp the fundamental concepts of cloud services
Secure compute, storage, and networking services across cloud platforms
Get to grips with identity management in the cloud
Secure Generative AI services in the cloud
Audit and monitor cloud services with a security-focused approach
Identify common threats and implement encryption to safeguard cloud services
Implement security in hybrid and multi-cloud environments
Design and maintain scalable security for large-scale cloud deployments
Who this book is forThis book is for IT professionals and information security personnel taking their first steps in the public cloud or migrating existing environments to the cloud. Cloud engineers, cloud architects, and cloud security professionals responsible for maintaining production environments in the cloud will also benefit from this book. Prior experience with deploying virtual machines, using storage services, and networking will help you to get the most out of this book.
Auflage
Sprache
Verlagsort
Editions-Typ
Maße
Höhe: 235 mm
Breite: 191 mm
Dicke: 26 mm
Gewicht
ISBN-13
978-1-83620-001-7 (9781836200017)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Eyal Estrin is a seasoned cloud security architect and an influential voice in the field of cloud computing and information security. With over 20 years of experience in the IT industry, he has been working with public clouds since 2015, gaining hands-on experience with AWS, Azure, and GCP. Eyal is also recognized as an AWS Community Builder, sharing his insights through public columns and engaging with the tech community about cloud security and cloud adoption. His books provide comprehensive comparisons of major cloud providers and best practices for securing cloud environments.
Table of Contents
Introduction to Cloud Security
Securing Compute Services - Virtual Machines
Securing Compute Services - Containers and Kubernetes
Securing Compute Services - Serverless and FaaS
Securing Storage Services
Securing Networking Services - Part 1
Securing Networking Services - Part 2
Securing Generative AI Services
Effective Strategies for Implementing IAM Solutions
Auditing and Threat Management in Cloud Environments
Applying Encryption in Cloud Services
Understanding Common Security Threats to Cloud Services
Engaging with Cloud Providers
Managing Hybrid Clouds
Managing Multi-Cloud Environments
Implementing DevSecOps
Security in Large-Scale Environments