Cloud Security Handbook for Architects: Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps
()
Currently unavailable
Currently unavailable
About this ebook
A comprehensive guide to secure your future on Cloud
KEY FEATURES
● Learn traditional security concepts in the cloud and compare data asset management with on-premises.
● Understand data asset management in the cloud and on-premises.
● Learn about adopting a DevSecOps strategy for scalability and flexibility of cloud infrastructure.
● Choose the right security solutions and design and implement native cloud controls.
DESCRIPTION
Cloud platforms face unique security issues and opportunities because of their evolving designs and API-driven automation. We will learn cloud-specific strategies for securing platforms such as AWS, Microsoft Azure, Google Cloud Platform, Oracle Cloud Infrastructure, and others. The book will help you implement data asset management, identity and access management, network security, vulnerability management, incident response, and compliance in your cloud environment.
This book helps cybersecurity teams strengthen their security posture by mitigating cyber risk when "targets" shift to the cloud. The book will assist you in identifying security issues and show you how to achieve best-in-class cloud security. It also includes new cybersecurity best practices for daily, weekly, and monthly processes that you can combine with your other daily IT and security operations to meet NIST criteria.
This book teaches how to leverage cloud computing by addressing the shared responsibility paradigm required to meet PCI-DSS, ISO 27001/2, and other standards. It will help you choose the right cloud security stack for your ecosystem. Moving forward, we will discuss the architecture and framework, building blocks of native cloud security controls, adoption of required security compliance, and the right culture to adopt this new paradigm shift in the ecosystem.
WHAT WILL YOU LEARN
● Understand the critical role of Identity and Access Management (IAM) in cloud environments.
● Address different types of security vulnerabilities in the cloud.
● Develop and apply effective incident response strategies for detecting, responding to, and recovering from security incidents.
● Establish a robust and secure security system by selecting appropriate security solutions for your cloud ecosystem.
● Ensure compliance with relevant regulations and requirements throughout your cloud journey.
● Explore container technologies and microservices design in the context of cloud security.
WHO IS THIS BOOK FOR?
The primary audience for this book will be the people who are directly or indirectly responsible for the cybersecurity and cloud security of the organization. This includes consultants, advisors, influencers, and those in decision-making roles who are focused on strengthening the cloud security of the organization. This book will also benefit the supporting staff, operations, and implementation teams as it will help them understand and enlighten the real picture of cloud security.
The right audience includes but is not limited to Chief Information Officer (CIO), Chief Information Security Officer (CISO), Chief Technology Officer (CTO), Chief Risk Officer (CRO), Cloud Architect, Cloud Security Architect, and security practice team.
AUTHOR BIO
Ashish Mishra is a seasoned IT professional and author who has more than 19 years of experience in the industry. He holds a strong grip and command of IT (Information Technology), IS (Information Security), and Cybersecurity domains. Ashish is also experienced in managing large IT and IS Operations, Strategy Building, Transformation Journey, Project and Program Management, and Service Delivery.
Related to Cloud Security Handbook for Architects
Related ebooks
Cloud Security Handbook for Architects: Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps Rating: 0 out of 5 stars0 ratingsPro Azure Governance and Security: A Comprehensive Guide to Azure Policy, Blueprints, Security Center, and Sentinel Rating: 0 out of 5 stars0 ratingsCollaboration with Cloud Computing: Security, Social Media, and Unified Communications Rating: 0 out of 5 stars0 ratingsMastering Cloud-Native Microservices: Designing and implementing Cloud-Native Microservices for Next-Gen Apps (English Edition) Rating: 0 out of 5 stars0 ratingsCloud Native Microservices Cookbook: Master the art of microservices in the cloud with over 100 practical recipes (English Edition) Rating: 0 out of 5 stars0 ratingsDevOps for Azure Applications: Deploy Web Applications on Azure Rating: 0 out of 5 stars0 ratingsBuilding an Effective Cybersecurity Program, 2nd Edition Rating: 0 out of 5 stars0 ratingsDemystifying DevSecOps in AWS: Achieve operational excellence in the cloud with DevSecOps (English Edition) Rating: 0 out of 5 stars0 ratingsUltimate Web Authentication Handbook Rating: 0 out of 5 stars0 ratingsBlueprints of DevSecOps: Foundations to Fortify Your Cloud Rating: 0 out of 5 stars0 ratingsInfosec Management Fundamentals Rating: 5 out of 5 stars5/5Azure Security Handbook: A Comprehensive Guide for Defending Your Enterprise Environment Rating: 0 out of 5 stars0 ratingsUltimate Snowflake Architecture for Cloud Data Warehousing Rating: 0 out of 5 stars0 ratingsBuilding Effective Cybersecurity Programs: A Security Manager’s Handbook Rating: 4 out of 5 stars4/5CompTIA Cloud+ Certification All-in-One Exam Guide (Exam CV0-003) Rating: 5 out of 5 stars5/5Hardening Azure Applications: Techniques and Principles for Building Large-Scale, Mission-Critical Applications Rating: 0 out of 5 stars0 ratingsBuilding Digital Experience Platforms: A Guide to Developing Next-Generation Enterprise Applications Rating: 0 out of 5 stars0 ratingsDeveloping Cloud Native Applications in Azure using .NET Core: A Practitioner’s Guide to Design, Develop and Deploy Apps Rating: 0 out of 5 stars0 ratingsUltimate Linux Network Security for Enterprises Rating: 0 out of 5 stars0 ratings
Security For You
How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsRemote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5Game Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega Rating: 0 out of 5 stars0 ratingsCISSP Study Guide Rating: 4 out of 5 stars4/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratings
Reviews for Cloud Security Handbook for Architects
0 ratings0 reviews