Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack

Buy

Secure public and private cloud workloads with this comprehensive learning guide.

Key Features

  • Take your cloud security functions to the next level by automation
  • Learn to automate your security functions on AWS and OpenStack
  • Practical approach towards securing your workloads efficiently

Book Description

Security issues are still a major concern for all IT organizations. For many enterprises, the move to cloud computing has raised concerns for security, but when applications are architected with focus on security, cloud platforms can be made just as secure as on-premises platforms. Cloud instances can be kept secure by employing security automation that helps make your data meet your organization's security policy.

This book starts with the basics of why cloud security is important and how automation can be the most effective way of controlling cloud security. You will then delve deeper into the AWS cloud environment and its security services by dealing with security functions such as Identity and Access Management and will also learn how these services can be automated. Moving forward, you will come across aspects such as cloud storage and data security, automating cloud deployments, and so on. Then, you'll work with OpenStack security modules and learn how private cloud security functions can be automated for better time- and cost-effectiveness. Toward the end of the book, you will gain an understanding of the security compliance requirements for your Cloud.

By the end of this book, you will have hands-on experience of automating your cloud security and governance.

What you will learn

  • Define security for public and private cloud services
  • Address the security concerns of your cloud
  • Understand Identity and Access Management
  • Get acquainted with cloud storage and network security
  • Improve and optimize public and private cloud security
  • Automate cloud security
  • Understand the security compliance requirements of your cloud

Who This Book Is For

This book is targeted at DevOps Engineers, Security professionals, or any stakeholders responsible for securing cloud workloads. Prior experience with AWS or OpenStack will be an advantage.

Table of Contents

  1. Introduction to Cloud Security
  2. Understanding the World of Cloud Automation
  3. Identity and Access Management in the Cloud
  4. Cloud Network Security
  5. Cloud Storage and Data Security
  6. Cloud Platform Security
  7. Private Cloud Security
  8. Automating Cloud Security
  9. Cloud Compliance
(HTML tags aren't allowed.)

The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems (Wireless Networks and Mobile Communications)
The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems (Wireless Networks and Mobile Communications)
Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range, heralding the dawn of an era in which today's Internet of People gives way to tomorrow's Internet of Things where billions of...
MacRuby in Action
MacRuby in Action
For developers who have learned the elegant and highly productive Ruby language, it can be a real drag to switch back to a traditional static programming tool like Objective-C. MacRuby, a Ruby 1.9 implementation that sits directly on the Mac OS X core, gives Rubyists the potential to code Cocoa apps without sacrificing the language features...
CorelDRAW 12: The Official Guide
CorelDRAW 12: The Official Guide

Create compelling graphics and vector animations for print and the Web using CorelDRAW 12. Inside this Corel-approved guide, expert author Steve Bain teaches you how to take full advantage of all the unique features this powerful application has to offer. You’ll learn to draw shapes, work with text, add color and effects, create...


Excel PivotTables and PivotCharts: Your visual blueprint for creating dynamic spreadsheets
Excel PivotTables and PivotCharts: Your visual blueprint for creating dynamic spreadsheets

Master two of the most powerful features of Excel

Even if you use Excel all the time, you may not be up to speed on two of Excel's most useful features. PivotTable and PivotChart turn long lists of unreadable data into dynamic, easy-to-read tables and charts that highlight the information you need most; you can tweak...

Computers and the Law: An Introduction to Basic Legal Principles and Their Application in Cyberspace
Computers and the Law: An Introduction to Basic Legal Principles and Their Application in Cyberspace

Computers and the Law provides readers with an introduction to the legal issues associated with computing - particularly in the massively networked context of the Internet. Assuming no previous knowledge of the law or any special knowledge of programming or computer science, this textbook offers undergraduates of all disciplines and...

Business Process Execution Language for Web Services BPEL and BPEL4WS 2nd Edition
Business Process Execution Language for Web Services BPEL and BPEL4WS 2nd Edition
This book is a comprehensive guide to the usage and syntax of the Business Process Execution Language for Web Services (BPEL4WS). Two major BPEL4WS servers, the Oracle BPEL Process Manager and Microsoft BizTalk Server 2004 are covered in detail, and an overview of other major BPEL4WS servers is provided. The book contains practical examples on...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy