Chapter
Publicly Available
PREFACE
-
Aditya K. Sood
Chapters in this book
- Frontmatter i
- CONTENTS vii
- PREFACE xvii
- ACKNOWLEDGMENTS xxi
- ABOUT THE AUTHOR xxiii
- CHAPTER 1 CLOUD ARCHITECTURE AND SECURITY FUNDAMENTALS 1
- CHAPTER 2 IAM FOR AUTHENTICATION AND AUTHORIZATION: SECURITY ASSESSMENT 23
- CHAPTER 3 CLOUD INFRASTRUCTURE: NETWORK SECURITY ASSESSMENT 75
- CHAPTER 4 DATABASE AND STORAGE SERVICES: SECURITY ASSESSMENT 125
- CHAPTER 5 DESIGN AND ANALYSIS OF CRYPTOGRAPHY CONTROLS: SECURITY ASSESSMENT 163
- CHAPTER 6 CLOUD APPLICATIONS: SECURE CODE REVIEW 201
- CHAPTER 7 CLOUD MONITORING AND LOGGING: SECURITY ASSESSMENT 249
- CHAPTER 8 PRIVACY IN THE CLOUD 279
- CHAPTER 9 CLOUD SECURITY AND PRIVACY: FLAWS, ATTACKS, AND IMPACT ASSESSMENTS 301
- CHAPTER 10 MALICIOUS CODE IN THE CLOUD 341
- CHAPTER 11 THREAT INTELLIGENCE AND MALWARE PROTECTION IN THE CLOUD 371
- CONCLUSION 403
- APPENDIX A LIST OF SERVERLESS COMPUTING SERVICE 405
- APPENDIX B LIST OF SERVERLESS FRAMEWORKS 407
- APPENDIX C LIST OF SAAS, PAAS, IAAS, AND FAAS PROVIDERS 409
- APPENDIX D LIST OF CONTAINERIZED SERVICES AND OPEN SOURCE SOFTWARE 411
- APPENDIX E LIST OF CRITICAL RDP VULNERABILITIES 413
- APPENDIX F LIST OF NETWORK TOOLS AND SCRIPTS 415
- APPENDIX G LIST OF DATABASES DEFAULT TCP/UDP PORTS 417
- APPENDIX H LIST OF DATABASE ASSESSMENT TOOLS, COMMANDS, AND SCRIPTS 419
- APPENDIX I LIST OF COUCHDB API COMMANDS AND RESOURCES 421
- APPENDIX J LIST OF CQLSH CASSANDRA DATABASE SQL QUERIES 423
- APPENDIX K LIST OF ELASTICSEARCH QUERIES 425
- APPENDIX L AWS SERVICES CLI COMMANDS 427
- APPENDIX M LIST OF VAULT AND SECRET MANAGERS 429
- APPENDIX N LIST OF TLS SECURITY VULNERABILITIES FOR ASSESSMENT 431
- APPENDIX O LIST OF CLOUD LOGGING AND MONITORING SERVICES 433
- INDEX 435
Chapters in this book
- Frontmatter i
- CONTENTS vii
- PREFACE xvii
- ACKNOWLEDGMENTS xxi
- ABOUT THE AUTHOR xxiii
- CHAPTER 1 CLOUD ARCHITECTURE AND SECURITY FUNDAMENTALS 1
- CHAPTER 2 IAM FOR AUTHENTICATION AND AUTHORIZATION: SECURITY ASSESSMENT 23
- CHAPTER 3 CLOUD INFRASTRUCTURE: NETWORK SECURITY ASSESSMENT 75
- CHAPTER 4 DATABASE AND STORAGE SERVICES: SECURITY ASSESSMENT 125
- CHAPTER 5 DESIGN AND ANALYSIS OF CRYPTOGRAPHY CONTROLS: SECURITY ASSESSMENT 163
- CHAPTER 6 CLOUD APPLICATIONS: SECURE CODE REVIEW 201
- CHAPTER 7 CLOUD MONITORING AND LOGGING: SECURITY ASSESSMENT 249
- CHAPTER 8 PRIVACY IN THE CLOUD 279
- CHAPTER 9 CLOUD SECURITY AND PRIVACY: FLAWS, ATTACKS, AND IMPACT ASSESSMENTS 301
- CHAPTER 10 MALICIOUS CODE IN THE CLOUD 341
- CHAPTER 11 THREAT INTELLIGENCE AND MALWARE PROTECTION IN THE CLOUD 371
- CONCLUSION 403
- APPENDIX A LIST OF SERVERLESS COMPUTING SERVICE 405
- APPENDIX B LIST OF SERVERLESS FRAMEWORKS 407
- APPENDIX C LIST OF SAAS, PAAS, IAAS, AND FAAS PROVIDERS 409
- APPENDIX D LIST OF CONTAINERIZED SERVICES AND OPEN SOURCE SOFTWARE 411
- APPENDIX E LIST OF CRITICAL RDP VULNERABILITIES 413
- APPENDIX F LIST OF NETWORK TOOLS AND SCRIPTS 415
- APPENDIX G LIST OF DATABASES DEFAULT TCP/UDP PORTS 417
- APPENDIX H LIST OF DATABASE ASSESSMENT TOOLS, COMMANDS, AND SCRIPTS 419
- APPENDIX I LIST OF COUCHDB API COMMANDS AND RESOURCES 421
- APPENDIX J LIST OF CQLSH CASSANDRA DATABASE SQL QUERIES 423
- APPENDIX K LIST OF ELASTICSEARCH QUERIES 425
- APPENDIX L AWS SERVICES CLI COMMANDS 427
- APPENDIX M LIST OF VAULT AND SECRET MANAGERS 429
- APPENDIX N LIST OF TLS SECURITY VULNERABILITIES FOR ASSESSMENT 431
- APPENDIX O LIST OF CLOUD LOGGING AND MONITORING SERVICES 433
- INDEX 435