目錄(266章)
倒序
- 封面
- 版權信息
- Credits
- About the Authors
- About the Reviewer
- www.PacktPub.com
- Why subscribe?
- Customer Feedback
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Downloading the example code
- Downloading the color images of this book
- Errata
- Piracy
- Questions
- Introduction to Ansible Playbooks and Roles
- Ansible terms to keep in mind
- Playbooks
- Ansible modules
- YAML syntax for writing Ansible playbooks
- Ansible roles
- Templates with Jinja2
- Jinja templating examples
- Conditional example
- Loops example
- LAMP stack playbook example – combining all the concepts
- Summary
- Ansible Tower Jenkins and Other Automation Tools
- Scheduling tools to enable the next abstraction of automation
- Getting up and running
- Setting up Ansible Tower
- Setting up Jenkins
- Setting up Rundeck
- Security automation use cases
- Adding playbooks
- Ansible Tower configuration
- Jenkins Ansible integration configuration
- Rundeck configuration
- Authentication and data security
- RBAC for Ansible Tower
- TLS/SSL for Ansible Tower
- Encryption and data security for Ansible Tower
- RBAC for Jenkins
- TLS/SSL for Jenkins
- Encryption and data security for Jenkins
- RBAC for Rundeck
- HTTP/TLS for Rundeck
- Encryption and data security for Rundeck
- Output of the playbooks
- Report management for Ansible Tower
- Report management for Jenkins
- Report management for Rundeck
- Scheduling of jobs
- Alerting notifications and webhooks
- Summary
- Setting Up a Hardened WordPress with Encrypted Automated Backups
- CLI for WordPress
- Why Ansible for this setup?
- A complete WordPress installation step-by-step
- Setting up nginx web server
- Setting up prerequisites
- Setting up MySQL database
- Installing PHP for WordPress setup
- Installing WordPress using WP-CLI
- Hardening SSH service
- Hardening a database service
- Hardening nginx
- Hardening WordPress
- Hardening a host firewall service
- Setting up automated encrypted backups in AWS S3
- Executing playbook against an Ubuntu 16.04 server using Ansible Tower
- Secure automated the WordPress updates
- Scheduling via Ansible Tower for daily updates
- Setting up Apache2 web server
- Enabling TLS/SSL with Let's Encrypt
- What if you don't want to roll your own? The Trellis stack
- Why would we use Trellis and when is it a good idea to use it?
- WordPress on Windows
- How to enable WinRM in Windows
- Running Ansible against a Windows server
- Installing IIS server using playbook
- Summary
- Log Monitoring and Serverless Automated Defense (Elastic Stack in AWS)
- Introduction to Elastic Stack
- Elasticsearch
- Logstash
- Kibana
- Beats
- Why should we use Elastic Stack for security monitoring and alerting?
- Prerequisites for setting up Elastic Stack
- Setting up the Elastic Stack
- Logstash integrations
- Kibana
- ElastAlert
- Installing Elasticsearch
- Installing Logstash
- Logstash configuration
- Installing Kibana
- Setting up nginx reverse proxy
- Installing Beats to send logs to Elastic Stack
- ElastAlert for alerting
- Configuring the Let's Encrypt service
- ElastAlert rule configuration
- Kibana dashboards
- Automated defense?
- AWS services used in setup
- DynamoDB
- Blacklist lambda function
- HandleExpiry lambda function
- Cloudwatch
- VPC Network ACL
- Setup
- Configuration
- Usage - block an IP address
- Request
- Response
- Automated defense lambda in action
- Summary
- Automating Web Application Security Testing Using OWASP ZAP
- Installing OWASP ZAP
- Installing Docker runtime
- OWASP ZAP Docker container setup
- A specialized tool for working with Containers - Ansible Container
- Configuring ZAP Baseline scan
- Running a vulnerable application container
- Running an OWASP ZAP Baseline scan
- Security testing against web applications and websites
- Running ZAP full scan against DVWS
- Testing web APIs
- Continuous scanning workflow using ZAP and Jenkins
- Setting up Jenkins
- Setting up the OWASP ZAP Jenkins plugin
- Some assembly required
- Triggering the build (ZAP scan)
- Playbook to do this with automation
- ZAP Docker and Jenkins
- Summary
- Vulnerability Scanning with Nessus
- Introduction to Nessus
- Installing Nessus for vulnerability assessments
- Configuring Nessus for vulnerability scanning
- Executing scans against a network
- Basic network scanning
- Running a scan using AutoNessus
- Setting up AutoNessus
- Running scans using AutoNessus
- Listing current available scans and IDs
- Starting a specified scan using scan ID
- Storing results
- Installing the Nessus REST API Python client
- Downloading reports using the Nessus REST API
- Nessus configuration
- Summary
- Security Hardening for Applications and Networks
- Security hardening with benchmarks such as CIS STIGs and NIST
- Operating system hardening for baseline using an Ansible playbook
- STIGs Ansible role for automated security hardening for Linux hosts
- Continuous security scans and reports for OpenSCAP using Ansible Tower
- CIS Benchmarks
- Ubuntu CIS Benchmarks (server level)
- AWS benchmarks (cloud provider level)
- Lynis – open source security auditing tool for Unix/Linux systems
- Lynis commands and advanced options
- Windows server audit using Ansible playbooks
- Windows security updates playbook
- Windows workstation and server audit
- Automating security audit checks for networking devices using Ansible
- Nmap scanning and NSE
- Nmap NSE scanning playbook
- AWS security audit using Scout2
- Automation security audit checks for applications using Ansible
- Source code analysis scanners
- Brakeman scanner – Rails security scanner
- Dependency-checking scanners
- OWASP Dependency-Check
- Running web application security scanners
- Nikto – web server scanner
- Framework-specific security scanners
- WordPress vulnerability scanner – WPScan
- Automated patching approaches using Ansible
- Rolling updates
- BlueGreen deployments
- BlueGreen deployment setup playbook
- BlueGreen deployment update playbook
- Summary
- Continuous Security Scanning for Docker Containers
- Understanding continuous security concepts
- Automating vulnerability assessments of Docker containers using Ansible
- Docker Bench for Security
- Clair
- Scheduled scans using Ansible Tower for Docker security
- Anchore – open container compliance platform
- Anchore Engine service setup
- Anchore CLI scanner
- Scheduled scans using Ansible Tower for operating systems and kernel security
- Vuls – vulnerability scanner
- Vuls setup playbook
- Vuls scanning playbook
- Scheduled scans for file integrity checks host-level monitoring using Ansible for various compliance initiatives
- osquery
- Summary
- Automating Lab Setups for Forensics Collection and Malware Analysis
- Creating Ansible playbooks for labs for isolated environments
- Collecting file and domain malware identification and classification
- VirusTotal API tool set up
- VirusTotal API scan for malware samples
- Setting up the Cuckoo Sandbox environment
- Setting up the Cuckoo host
- Setting up Cuckoo guest
- Submitting samples and reporting using Ansible playbook
- Setting up Cuckoo using Docker containers
- Setting up MISP and Threat Sharing
- Setting up MISP using Ansible playbook
- MISP web user interface
- Setting up Viper - binary management and analysis framework
- Creating Ansible playbooks for collection and storage with secure backup of forensic artifacts
- Collecting log artifacts for incident response
- Secure backups for data collection
- Summary
- Writing an Ansible Module for Security Testing
- Getting started with a hello world Ansible module
- Code
- Setting up the development environment
- Planning and what to keep in mind
- OWASP ZAP module
- Create ZAP using Docker
- Creating a vulnerable application
- Ansible module template
- Metadata
- Documenting the module
- Source code template
- OWASP ZAP Python API sample script
- Complete code listing
- Running the module
- Playbook for the module
- Adding an API key as an argument
- Adding scan type as an argument
- Using Ansible as a Python module
- Summary
- Ansible Security Best Practices References and Further Reading
- Working with Ansible Vault
- How to use Ansible Vault with variables and files
- Ansible Vault single encrypted variable
- Ansible Vault usage in Ansible Tower
- Setting up and using Ansible Galaxy
- Using Ansible Galaxy roles
- Publishing our role to Ansible Galaxy
- Ansible Galaxy local setup
- Ansible controller machine security
- Explanation of Ansible OS hardening playbook
- Best practices and reference playbook projects
- DebOps – your Debian-based data center in a box
- Setting up the DebOps controller
- Algo – set up a personal IPSEC VPN in the cloud
- OpenStack-Ansible
- Additional references
- Streisand – automated installation and configuration of anti-censorship software
- Sovereign – maintain your own private cloud using Ansible playbooks
- AWX – open source version of Ansible Tower
- Coming soon to Ansible 2.5
- Summary 更新時間:2021-07-02 22:00:47
推薦閱讀
- Design for the Future
- 大數據技術基礎
- Verilog HDL數字系統設計入門與應用實例
- 教父母學會上網
- 數控銑削(加工中心)編程與加工
- 21天學通Visual Basic
- 四向穿梭式自動化密集倉儲系統的設計與控制
- 大數據技術與應用
- Android游戲開發案例與關鍵技術
- 計算機與信息技術基礎上機指導
- INSTANT Munin Plugin Starter
- Java求職寶典
- Learning Couchbase
- EDA技術及其創新實踐(Verilog HDL版)
- 單片機原理、接口及應用系統設計
- 淘寶網店頁面設計、布局、配色、裝修一本通
- ARM? Cortex? M4 Cookbook
- Java開發手冊
- Linux那些事兒之我是USB
- 微機原理與接口技術
- 51系列單片機系統設計與實踐
- C語言程序設計任務驅動式教程(第2版)(微課版)
- Splunk 7.x Quick Start Guide
- 伺服驅動器維修手冊
- Nmap:Network Exploration and Security Auditing Cookbook(Second Edition)
- Hands-On Serverless Deep Learning with TensorFlow and AWS Lambda
- Mastering Kibana 6.x
- Excel 2007公式、函數與圖表應用
- 微視頻詳解西門子S7-1500 PLC
- Hands-On Recommendation Systems with Python