Home Mathematics APPENDIX L AWS SERVICES CLI COMMANDS
Chapter
Licensed
Unlicensed Requires Authentication

APPENDIX L AWS SERVICES CLI COMMANDS

  • Aditya K. Sood
View more publications by Mercury Learning and Information
Empirical Cloud Security
This chapter is in the book Empirical Cloud Security
© 2021 Walter de Gruyter GmbH, Berlin/Boston

© 2021 Walter de Gruyter GmbH, Berlin/Boston

Chapters in this book

  1. Frontmatter i
  2. CONTENTS vii
  3. PREFACE xvii
  4. ACKNOWLEDGMENTS xxi
  5. ABOUT THE AUTHOR xxiii
  6. CHAPTER 1 CLOUD ARCHITECTURE AND SECURITY FUNDAMENTALS 1
  7. CHAPTER 2 IAM FOR AUTHENTICATION AND AUTHORIZATION: SECURITY ASSESSMENT 23
  8. CHAPTER 3 CLOUD INFRASTRUCTURE: NETWORK SECURITY ASSESSMENT 75
  9. CHAPTER 4 DATABASE AND STORAGE SERVICES: SECURITY ASSESSMENT 125
  10. CHAPTER 5 DESIGN AND ANALYSIS OF CRYPTOGRAPHY CONTROLS: SECURITY ASSESSMENT 163
  11. CHAPTER 6 CLOUD APPLICATIONS: SECURE CODE REVIEW 201
  12. CHAPTER 7 CLOUD MONITORING AND LOGGING: SECURITY ASSESSMENT 249
  13. CHAPTER 8 PRIVACY IN THE CLOUD 279
  14. CHAPTER 9 CLOUD SECURITY AND PRIVACY: FLAWS, ATTACKS, AND IMPACT ASSESSMENTS 301
  15. CHAPTER 10 MALICIOUS CODE IN THE CLOUD 341
  16. CHAPTER 11 THREAT INTELLIGENCE AND MALWARE PROTECTION IN THE CLOUD 371
  17. CONCLUSION 403
  18. APPENDIX A LIST OF SERVERLESS COMPUTING SERVICE 405
  19. APPENDIX B LIST OF SERVERLESS FRAMEWORKS 407
  20. APPENDIX C LIST OF SAAS, PAAS, IAAS, AND FAAS PROVIDERS 409
  21. APPENDIX D LIST OF CONTAINERIZED SERVICES AND OPEN SOURCE SOFTWARE 411
  22. APPENDIX E LIST OF CRITICAL RDP VULNERABILITIES 413
  23. APPENDIX F LIST OF NETWORK TOOLS AND SCRIPTS 415
  24. APPENDIX G LIST OF DATABASES DEFAULT TCP/UDP PORTS 417
  25. APPENDIX H LIST OF DATABASE ASSESSMENT TOOLS, COMMANDS, AND SCRIPTS 419
  26. APPENDIX I LIST OF COUCHDB API COMMANDS AND RESOURCES 421
  27. APPENDIX J LIST OF CQLSH CASSANDRA DATABASE SQL QUERIES 423
  28. APPENDIX K LIST OF ELASTICSEARCH QUERIES 425
  29. APPENDIX L AWS SERVICES CLI COMMANDS 427
  30. APPENDIX M LIST OF VAULT AND SECRET MANAGERS 429
  31. APPENDIX N LIST OF TLS SECURITY VULNERABILITIES FOR ASSESSMENT 431
  32. APPENDIX O LIST OF CLOUD LOGGING AND MONITORING SERVICES 433
  33. INDEX 435
Downloaded on 21.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/9781683926849-027/html
Scroll to top button