Kapitel
Lizenziert
Nicht lizenziert
Erfordert eine Authentifizierung
Appendix O: List of Cloud Logging and Monitoring Services
-
Aditya K. Sood
Sie haben derzeit keinen Zugang zu diesem Inhalt.
Sie haben derzeit keinen Zugang zu diesem Inhalt.
Kapitel in diesem Buch
- Frontmatter i
- Contents vii
- Preface xxi
- About the Author xxvii
- Chapter 1: Cloud Architecture and Security Fundamentals 1
- Chapter 2: IAM for Authentication and Authorization: Security Assessment 29
- Chapter 3: Cloud Infrastructure: Network Security Assessment 79
- Chapter 4: Database and Storage Services: Security Assessment 145
- Chapter 5: Design and Analysis of Cryptography Controls: Security Assessment 181
- Chapter 6: Cloud Applications: Secure Code Review 219
- Chapter 7: Cloud Monitoring and Logging: Security Assessment 269
- Chapter 8: Privacy in the Cloud 299
- Chapter 9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments 319
- Chapter 10: Malicious Code in the Cloud 355
- Chapter 11: Threat Intelligence and Malware Protection in the Cloud 385
- Appendix A: List of Serverless Computing Services 419
- Appendix B: List of Serverless Frameworks 421
- Appendix C: List of Saas, Paas, Iaas, and Faas Providers 423
- Appendix D: List of Containerized Services and Open Source Software 425
- Appendix E: List of Critical RDP Vulnerabilities 427
- Appendix F: List of Network Tools and Scripts 429
- Appendix G: List of Databases Default TCP/UDP Ports 431
- Appendix H: List of Database Assessment Tools, Commands, and Scripts 433
- Appendix I: List of CouchDB API Commands and Resources 435
- Appendix J: List of CQLSH Cassandra Database SQL Queries 437
- Appendix K: List of Elasticsearch Queries 439
- Appendix L: AWS Services CLI Commands 441
- Appendix M: List of Vault and Secret Managers 443
- Appendix N: List of TLS Security Vulnerabilities for Assessment 445
- Appendix O: List of Cloud Logging and Monitoring Services 447
- Appendix P: Enterprise Threat Intelligence Platforms 449
- Index 453
Kapitel in diesem Buch
- Frontmatter i
- Contents vii
- Preface xxi
- About the Author xxvii
- Chapter 1: Cloud Architecture and Security Fundamentals 1
- Chapter 2: IAM for Authentication and Authorization: Security Assessment 29
- Chapter 3: Cloud Infrastructure: Network Security Assessment 79
- Chapter 4: Database and Storage Services: Security Assessment 145
- Chapter 5: Design and Analysis of Cryptography Controls: Security Assessment 181
- Chapter 6: Cloud Applications: Secure Code Review 219
- Chapter 7: Cloud Monitoring and Logging: Security Assessment 269
- Chapter 8: Privacy in the Cloud 299
- Chapter 9: Cloud Security and Privacy: Flaws, Attacks, and Impact Assessments 319
- Chapter 10: Malicious Code in the Cloud 355
- Chapter 11: Threat Intelligence and Malware Protection in the Cloud 385
- Appendix A: List of Serverless Computing Services 419
- Appendix B: List of Serverless Frameworks 421
- Appendix C: List of Saas, Paas, Iaas, and Faas Providers 423
- Appendix D: List of Containerized Services and Open Source Software 425
- Appendix E: List of Critical RDP Vulnerabilities 427
- Appendix F: List of Network Tools and Scripts 429
- Appendix G: List of Databases Default TCP/UDP Ports 431
- Appendix H: List of Database Assessment Tools, Commands, and Scripts 433
- Appendix I: List of CouchDB API Commands and Resources 435
- Appendix J: List of CQLSH Cassandra Database SQL Queries 437
- Appendix K: List of Elasticsearch Queries 439
- Appendix L: AWS Services CLI Commands 441
- Appendix M: List of Vault and Secret Managers 443
- Appendix N: List of TLS Security Vulnerabilities for Assessment 445
- Appendix O: List of Cloud Logging and Monitoring Services 447
- Appendix P: Enterprise Threat Intelligence Platforms 449
- Index 453