舉報

會員
Mastering AWS Security
最新章節(jié):
Summary
ThisbookisforallITprofessionals,systemadministratorsandsecurityanalysts,solutionarchitectsandChiefInformationSecurityOfficerswhoareresponsibleforsecuringworkloadsinAWSfortheirorganizations.ItishelpfulforallSolutionsArchitectswhowanttodesignandimplementsecurearchitectureonAWSbythefollowingsecuritybydesignprinciple.ThisbookishelpfulforpersonnelinAuditorsandProjectManagementroletounderstandhowtheycanauditAWSworkloadsandhowtheycanmanagesecurityinAWSrespectively.IfyouarelearningAWSorchampioningAWSadoptioninyourorganization,youshouldreadthisbooktobuildsecurityinallyourworkloads.YouwillbenefitfromknowingaboutsecurityfootprintofallmajorAWSservicesformultipledomains,usecases,andscenarios.
目錄(297章)
倒序
- coverpage
- Title Page
- Copyright
- Mastering AWS Security
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- why subscribe
- Customer Feedback
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Readers feedback
- Customer support
- Downloading the color images of this book
- Errata
- Piracy
- Questions
- Overview of Security in AWS
- Chapter overview
- AWS shared security responsibility model
- Shared responsibility model for infrastructure services
- Shared responsibility model for container services
- Shared responsibility model for abstracted services
- AWS Security responsibilities
- Physical and environmental security
- Storage device decommissioning
- Business continuity management
- Communication
- Network security
- Secure network architecture
- Secure access points
- Transmission protection
- Network monitoring and protection
- AWS access
- Credentials policy
- Customer security responsibilities
- AWS account security features
- AWS account
- AWS credentials
- Individual user accounts
- Secure HTTPS access points
- Security logs
- AWS Trusted Advisor security checks
- AWS Config security checks
- AWS Security services
- AWS Identity and Access Management
- AWS Virtual Private Cloud
- AWS Key Management System (KMS)
- AWS Shield
- AWS Web Application Firewall (WAF)
- AWS CloudTrail
- AWS CloudWatch
- AWS Config
- AWS Artifact
- Penetration testing
- AWS Security resources
- AWS documentation
- AWS whitepapers
- AWS case studies
- AWS YouTube channel
- AWS blogs
- AWS Partner Network
- AWS Marketplace
- Summary
- AWS Identity and Access Management
- Chapter overview
- IAM features and tools
- Security
- AWS account shared access
- Granular permissions
- Identity Federation
- Temporary credentials
- AWS Management Console
- AWS command line tools
- AWS SDKs
- IAM HTTPS API
- IAM Authentication
- IAM user
- IAM groups
- IAM roles
- AWS service role
- AWS SAML role
- Role for cross-account access
- Role for Web Identity Provider
- Identity Provider and Federation
- Delegation
- Temporary security credentials
- AWS Security Token Service
- The account root user
- IAM Authorization
- Permissions
- Policy
- Statement
- Effect
- Principal
- Action
- Resource
- Condition
- Creating a new policy
- IAM Policy Simulator
- IAM Policy Validator
- Access Advisor
- Passwords Policy
- AWS credentials
- IAM limitations
- IAM best practices
- Summary
- AWS Virtual Private Cloud
- Chapter overview
- VPC components
- Subnets
- Elastic Network Interfaces (ENI)
- Route tables
- Internet Gateway
- Elastic IP addresses
- VPC endpoints
- Network Address Translation (NAT)
- VPC peering
- VPC features and benefits
- Multiple connectivity options
- Secure
- Simple
- VPC use cases
- Hosting a public facing website
- Hosting multi-tier web application
- Creating branch office and business unit networks
- Hosting web applications in the AWS Cloud that are connected with your data center
- Extending corporate network in AWS Cloud
- Disaster recovery
- VPC security
- Security groups
- Network access control list
- VPC flow logs
- VPC access control
- Creating VPC
- VPC connectivity options
- Connecting user network to AWS VPC
- Connecting AWS VPC with other AWS VPC
- Connecting internal user with AWS VPC
- VPC limits
- VPC best practices
- Plan your VPC before you create it
- Choose the highest CIDR block
- Unique IP address range
- Leave the default VPC alone
- Design for region expansion
- Tier your subnets
- Follow the least privilege principle
- Keep most resources in the private subnet
- Creating VPCs for different use cases
- Favor security groups over NACLs
- IAM your VPC
- Using VPC peering
- Using Elastic IP instead of public IP
- Tagging in VPC
- Monitoring a VPC
- Summary
- Data Security in AWS
- Chapter overview
- Encryption and decryption fundamentals
- Envelope encryption
- Securing data at rest
- Amazon S3
- Permissions
- Versioning
- Replication
- Server-Side encryption
- Client-Side encryption
- Amazon EBS
- Replication
- Backup
- Encryption
- Amazon RDS
- Amazon Glacier
- Amazon DynamoDB
- Amazon EMR
- Securing data in transit
- Amazon S3
- Amazon RDS
- Amazon DynamoDB
- Amazon EMR
- AWS KMS
- KMS benefits
- Fully managed
- Centralized Key Management
- Integration with AWS services
- Secure and compliant
- KMS components
- Customer master key (CMK)
- Data keys
- Key policies
- Auditing CMK usage
- Key Management Infrastructure (KMI)
- AWS CloudHSM
- CloudHSM features
- Generate and use encryption keys using HSMs
- Pay as you go model
- Easy To manage
- AWS CloudHSM use cases
- Offload SSL/TLS processing for web servers
- Protect private keys for an issuing certificate authority
- Enable transparent data encryption for Oracle databases
- Amazon Macie
- Data discovery and classification
- Data security
- Summary
- Securing Servers in AWS
- EC2 Security best practices
- EC2 Security
- IAM roles for EC2 instances
- Managing OS-level access to Amazon EC2 instances
- Protecting your instance from malware
- Secure your infrastructure
- Intrusion Detection and Prevention Systems
- Elastic Load Balancing Security
- Building Threat Protection Layers
- Testing security
- Amazon Inspector
- Amazon Inspector features and benefits
- Amazon Inspector components
- AWS Shield
- AWS Shield benefits
- AWS Shield features
- AWS Shield Standard
- AWS Shield Advanced
- Summary
- Securing Applications in AWS
- AWS Web Application Firewall (WAF)
- Benefits of AWS WAF
- Working with AWS WAF
- Signing AWS API requests
- Amazon Cognito
- Amazon API Gateway
- Summary
- Monitoring in AWS
- AWS CloudWatch
- Features and benefits
- AWS CloudWatch components
- Metrics
- Dashboards
- Events
- Alarms
- Log Monitoring
- Monitoring Amazon EC2
- Automated monitoring tools
- Manual monitoring tools
- Best practices for monitoring EC2 instances
- Summary
- Logging and Auditing in AWS
- Logging in AWS
- AWS native security logging capabilities
- Best practices
- AWS CloudTrail
- AWS Config
- AWS detailed billing reports
- Amazon S3 Access Logs
- ELB Logs
- Amazon CloudFront Access Logs
- Amazon RDS Logs
- Amazon VPC Flow Logs
- AWS CloudWatch Logs
- CloudWatch Logs concepts
- CloudWatch Logs limits
- Lifecycle of CloudWatch Logs
- AWS CloudTrail
- AWS CloudTrail concepts
- AWS CloudTrail benefits
- AWS CloudTrail use cases
- Security at Scale with AWS Logging
- AWS CloudTrail best practices
- Auditing in AWS
- AWS Artifact
- AWS Config
- AWS Config use cases
- AWS Trusted Advisor
- AWS Service Catalog
- AWS Security Audit Checklist
- Summary
- AWS Security Best Practices
- Shared security responsibility model
- IAM security best practices
- VPC
- Data security
- Security of servers
- Application security
- Monitoring logging and auditing
- AWS CAF
- Security perspective
- Directive component
- Preventive component
- Detective component
- Responsive component
- Summary 更新時間:2021-07-02 15:44:54
推薦閱讀
- 密碼學(xué)原理與Java實現(xiàn)
- Mastering Kotlin
- Spring Cloud、Nginx高并發(fā)核心編程
- UI智能化與前端智能化:工程技術(shù)、實現(xiàn)方法與編程思想
- Oracle Database 12c Security Cookbook
- 信息技術(shù)應(yīng)用基礎(chǔ)
- C語言程序設(shè)計
- C++反匯編與逆向分析技術(shù)揭秘(第2版)
- HTML+CSS+JavaScript編程入門指南(全2冊)
- 軟件工程基礎(chǔ)與實訓(xùn)教程
- C編程技巧:117個問題解決方案示例
- MongoDB Cookbook(Second Edition)
- 大學(xué)計算機應(yīng)用基礎(chǔ)(Windows 7+Office 2010)(IC3)
- Isomorphic Go
- RESTful Web API Design with Node.js
- Learning Alfresco Web Scripts
- Java EE 程序設(shè)計
- LibGDX Game Development By Example
- Opa Application Development
- Unreal Engine 4 Game Development Essentials
- 深度學(xué)習(xí)企業(yè)實戰(zhàn):基于R語言
- Learning IPython for Interactive Computing and Data Visualization(Second Edition)
- Smart Internet of Things Projects
- 架構(gòu)真意:企業(yè)級應(yīng)用架構(gòu)設(shè)計方法論與實踐
- 速學(xué)Django:Web開發(fā)從入門到進階
- 新印象:中文版Sketch圖標(biāo)與UI界面設(shè)計實例教程
- Implementing Qlik Sense
- Visual Basic編程全能詞典
- Using Node.js for UI Testing
- 圖解CSS3:核心技術(shù)與案例實戰(zhàn)