舉報

會員
Mastering AWS Security
最新章節:
Summary
ThisbookisforallITprofessionals,systemadministratorsandsecurityanalysts,solutionarchitectsandChiefInformationSecurityOfficerswhoareresponsibleforsecuringworkloadsinAWSfortheirorganizations.ItishelpfulforallSolutionsArchitectswhowanttodesignandimplementsecurearchitectureonAWSbythefollowingsecuritybydesignprinciple.ThisbookishelpfulforpersonnelinAuditorsandProjectManagementroletounderstandhowtheycanauditAWSworkloadsandhowtheycanmanagesecurityinAWSrespectively.IfyouarelearningAWSorchampioningAWSadoptioninyourorganization,youshouldreadthisbooktobuildsecurityinallyourworkloads.YouwillbenefitfromknowingaboutsecurityfootprintofallmajorAWSservicesformultipledomains,usecases,andscenarios.
目錄(297章)
倒序
- coverpage
- Title Page
- Copyright
- Mastering AWS Security
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- why subscribe
- Customer Feedback
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Readers feedback
- Customer support
- Downloading the color images of this book
- Errata
- Piracy
- Questions
- Overview of Security in AWS
- Chapter overview
- AWS shared security responsibility model
- Shared responsibility model for infrastructure services
- Shared responsibility model for container services
- Shared responsibility model for abstracted services
- AWS Security responsibilities
- Physical and environmental security
- Storage device decommissioning
- Business continuity management
- Communication
- Network security
- Secure network architecture
- Secure access points
- Transmission protection
- Network monitoring and protection
- AWS access
- Credentials policy
- Customer security responsibilities
- AWS account security features
- AWS account
- AWS credentials
- Individual user accounts
- Secure HTTPS access points
- Security logs
- AWS Trusted Advisor security checks
- AWS Config security checks
- AWS Security services
- AWS Identity and Access Management
- AWS Virtual Private Cloud
- AWS Key Management System (KMS)
- AWS Shield
- AWS Web Application Firewall (WAF)
- AWS CloudTrail
- AWS CloudWatch
- AWS Config
- AWS Artifact
- Penetration testing
- AWS Security resources
- AWS documentation
- AWS whitepapers
- AWS case studies
- AWS YouTube channel
- AWS blogs
- AWS Partner Network
- AWS Marketplace
- Summary
- AWS Identity and Access Management
- Chapter overview
- IAM features and tools
- Security
- AWS account shared access
- Granular permissions
- Identity Federation
- Temporary credentials
- AWS Management Console
- AWS command line tools
- AWS SDKs
- IAM HTTPS API
- IAM Authentication
- IAM user
- IAM groups
- IAM roles
- AWS service role
- AWS SAML role
- Role for cross-account access
- Role for Web Identity Provider
- Identity Provider and Federation
- Delegation
- Temporary security credentials
- AWS Security Token Service
- The account root user
- IAM Authorization
- Permissions
- Policy
- Statement
- Effect
- Principal
- Action
- Resource
- Condition
- Creating a new policy
- IAM Policy Simulator
- IAM Policy Validator
- Access Advisor
- Passwords Policy
- AWS credentials
- IAM limitations
- IAM best practices
- Summary
- AWS Virtual Private Cloud
- Chapter overview
- VPC components
- Subnets
- Elastic Network Interfaces (ENI)
- Route tables
- Internet Gateway
- Elastic IP addresses
- VPC endpoints
- Network Address Translation (NAT)
- VPC peering
- VPC features and benefits
- Multiple connectivity options
- Secure
- Simple
- VPC use cases
- Hosting a public facing website
- Hosting multi-tier web application
- Creating branch office and business unit networks
- Hosting web applications in the AWS Cloud that are connected with your data center
- Extending corporate network in AWS Cloud
- Disaster recovery
- VPC security
- Security groups
- Network access control list
- VPC flow logs
- VPC access control
- Creating VPC
- VPC connectivity options
- Connecting user network to AWS VPC
- Connecting AWS VPC with other AWS VPC
- Connecting internal user with AWS VPC
- VPC limits
- VPC best practices
- Plan your VPC before you create it
- Choose the highest CIDR block
- Unique IP address range
- Leave the default VPC alone
- Design for region expansion
- Tier your subnets
- Follow the least privilege principle
- Keep most resources in the private subnet
- Creating VPCs for different use cases
- Favor security groups over NACLs
- IAM your VPC
- Using VPC peering
- Using Elastic IP instead of public IP
- Tagging in VPC
- Monitoring a VPC
- Summary
- Data Security in AWS
- Chapter overview
- Encryption and decryption fundamentals
- Envelope encryption
- Securing data at rest
- Amazon S3
- Permissions
- Versioning
- Replication
- Server-Side encryption
- Client-Side encryption
- Amazon EBS
- Replication
- Backup
- Encryption
- Amazon RDS
- Amazon Glacier
- Amazon DynamoDB
- Amazon EMR
- Securing data in transit
- Amazon S3
- Amazon RDS
- Amazon DynamoDB
- Amazon EMR
- AWS KMS
- KMS benefits
- Fully managed
- Centralized Key Management
- Integration with AWS services
- Secure and compliant
- KMS components
- Customer master key (CMK)
- Data keys
- Key policies
- Auditing CMK usage
- Key Management Infrastructure (KMI)
- AWS CloudHSM
- CloudHSM features
- Generate and use encryption keys using HSMs
- Pay as you go model
- Easy To manage
- AWS CloudHSM use cases
- Offload SSL/TLS processing for web servers
- Protect private keys for an issuing certificate authority
- Enable transparent data encryption for Oracle databases
- Amazon Macie
- Data discovery and classification
- Data security
- Summary
- Securing Servers in AWS
- EC2 Security best practices
- EC2 Security
- IAM roles for EC2 instances
- Managing OS-level access to Amazon EC2 instances
- Protecting your instance from malware
- Secure your infrastructure
- Intrusion Detection and Prevention Systems
- Elastic Load Balancing Security
- Building Threat Protection Layers
- Testing security
- Amazon Inspector
- Amazon Inspector features and benefits
- Amazon Inspector components
- AWS Shield
- AWS Shield benefits
- AWS Shield features
- AWS Shield Standard
- AWS Shield Advanced
- Summary
- Securing Applications in AWS
- AWS Web Application Firewall (WAF)
- Benefits of AWS WAF
- Working with AWS WAF
- Signing AWS API requests
- Amazon Cognito
- Amazon API Gateway
- Summary
- Monitoring in AWS
- AWS CloudWatch
- Features and benefits
- AWS CloudWatch components
- Metrics
- Dashboards
- Events
- Alarms
- Log Monitoring
- Monitoring Amazon EC2
- Automated monitoring tools
- Manual monitoring tools
- Best practices for monitoring EC2 instances
- Summary
- Logging and Auditing in AWS
- Logging in AWS
- AWS native security logging capabilities
- Best practices
- AWS CloudTrail
- AWS Config
- AWS detailed billing reports
- Amazon S3 Access Logs
- ELB Logs
- Amazon CloudFront Access Logs
- Amazon RDS Logs
- Amazon VPC Flow Logs
- AWS CloudWatch Logs
- CloudWatch Logs concepts
- CloudWatch Logs limits
- Lifecycle of CloudWatch Logs
- AWS CloudTrail
- AWS CloudTrail concepts
- AWS CloudTrail benefits
- AWS CloudTrail use cases
- Security at Scale with AWS Logging
- AWS CloudTrail best practices
- Auditing in AWS
- AWS Artifact
- AWS Config
- AWS Config use cases
- AWS Trusted Advisor
- AWS Service Catalog
- AWS Security Audit Checklist
- Summary
- AWS Security Best Practices
- Shared security responsibility model
- IAM security best practices
- VPC
- Data security
- Security of servers
- Application security
- Monitoring logging and auditing
- AWS CAF
- Security perspective
- Directive component
- Preventive component
- Detective component
- Responsive component
- Summary 更新時間:2021-07-02 15:44:54
推薦閱讀
- 少兒人工智能趣味入門:Scratch 3.0動畫與游戲編程
- Windows Presentation Foundation Development Cookbook
- Learning AndEngine
- C語言程序設計
- 鋒利的SQL(第2版)
- 微信小程序開發解析
- 大模型RAG實戰:RAG原理、應用與系統構建
- Mastering JavaScript High Performance
- Linux C編程:一站式學習
- 軟件供應鏈安全:源代碼缺陷實例剖析
- Laravel Application Development Blueprints
- UML2面向對象分析與設計(第2版)
- Python網絡爬蟲技術與應用
- C指針原理揭秘:基于底層實現機制
- R的極客理想:量化投資篇
- INSTANT Apache Hive Essentials How-to
- 虛擬現實:引領未來的人機交互革命
- C語言程序設計
- Thymeleaf 3完全手冊
- 寫給所有人的編程思維
- Mastering Assembly Programming
- 計算機網絡基礎
- Hadoop技術內幕:深入解析HadoopCommon和HDFS架構設計與實現原理
- 區塊鏈智能合約安全入門
- 軟件設計基礎理論
- 數據結構編程實驗(第3版)
- Scratch 3.0少兒編程與算法一本通
- Swift 3 Functional Programming
- Java Web輕量級開發全體驗
- 點睛:ActionScript3.0游戲互動編程