Leanpub Header

Skip to main content

Cloud Security - Quick Reference

Are you looking to achieve a good understanding of your responsibilities as well as your CSPs responsibilities to make sure your security stature in the Cloud is where you need it to be? Do you need the technical direction required to create your secure Cloud environment? You can think of this book as your technical Cloud consultant.

The author is letting you choose the price you pay for this book!

Pick Your Price...
PDF
EPUB
WEB
78
Pages
About

About

About the Book

In this book we walk through threat modelling your Cloud environment. We break down and provide solid understanding of the shared responsibility model, that is: What are the CSPs responsibilities and what are your responsibilities as a consumer of the services that your chosen CSP offers. We provide a set of questions and possible answers to help you evaluate the most suitable CSP for your needs.

We discus the pros and cons of the Cloud vs In-house clouds, along with techniques for improving your understanding and implementation of the principle of least privilege in the Cloud.

The book also covers:

  • Techniques and tools for storing and accessing secrets in the Cloud securely
  • Risks and countermeasures of serverless offerings
  • Infrastructure and configuration management techniques and tools
  • An interview with Scott Piper (AWS security specialist)
  • Many other tips, tricks and tools

Discounts: If you would like a discount, please email me, letting me know how much you would be willing to pay. The less you pay, the more I may consult with you about your reader experience, etc.

Homepage: https://binarymist.io/publication/cloud-security/

Authors Other Books: https://binarymist.io/publication/kims-selected-publications/

Authors Homepage: binarymist.io

Price

Pick Your Price...

Minimum price

$12.00

$12.00

You pay

$12.00

Author earns

$9.60
$

All prices are in US $. You can pay in US $ or in your local currency when you check out.

EU customers: prices exclude VAT, which is added during checkout.

...Or Buy With Credits!

Number of credits (Minimum 1)

1
The author will earn $12.00 from your purchase!
You can get credits monthly with a Reader Membership

Author

About the Author

Kim Carter

Technologist / Engineer, Information Security Professional, Entrepreneur, creator of PurpleTeam, and the founder of BinaryMist Ltd. OWASP NZ Chapter Leader. Certified Scrum Master. Facilitator, mentor and motivator of cross functional, self managing teams. With a solid 20 years of commercial industry experience across many domains, Kim enjoys teaching others how to apply information security to their Agile processes, bringing the security focus up front where it's the cheapest to implement, increasing profit and reducing costs. Organiser of two information security conferences (OWASP NZ Day and Christchurch Hacker Con), International trainer, speaker, and Software Engineering Radio podcast host, focusing on:

  1. Software and network architecture
  2. Web development and engineering
  3. Information security

Kim is also a regular blog poster at binarymist.io/blog. Kim loves designing and creating robust software and networks, breaking software and networks, then fixing them and helping organisations increase productivity.

Kim's Other Books: binarymist.io/publication/kims-selected-publications/

Contents

Table of Contents

Preface

  1. Description
  2. Purpose
  3. Reason

Introduction

1. Asset Identification

  1. Productivity
  2. Competitive Advantage
  3. Control
  4. Data

2. Identify Risks

  1. Shared Responsibility Model
  2. CSP Responsibility
  3. CSP Customer Responsibility
  4. CSP Evaluation
  5. Cloud Service Provider vs In-house
  6. Skills
  7. EULA
  8. Giving up Secrets
  9. Location of Data
  10. Vendor lock-in
  11. Possible Single Points of Failure
  12. Review Other Chapters
  13. People
  14. Application Security
  15. Network Security
  16. Violations of Least Privilege
  17. Machine Instance Single User Root
  18. CSP Account Single User Root
  19. Storage of Secrets
  20. Private Key Abuse
  21. SSH
  22. TLS
  23. Credentials and Other Secrets
  24. Entered by People (manually)
  25. Entered by Software (automatically)
  26. Serverless
  27. Third Party Services
  28. Perimeterless
  29. Functions
  30. DoS of Lambda Functions
  31. Infrastructure and Configuration Management
  32. AWS
  33. Password-less sudo

3. Countermeasures

  1. Shared Responsibility Model
  2. CSP Responsibility
  3. CSP Customer Responsibility
  4. CSP Evaluation
  5. Cloud Service Provider vs In-house
  6. Skills
  7. EULA
  8. Giving up Secrets
  9. Location of Data
  10. Vendor lock-in
  11. Possible Single Points of Failure
  12. Review Other Chapters
  13. People
  14. Application Security
  15. Network Security
  16. Violations of Least Privilege
  17. Machine Instance Single User Root
  18. CSP Account Single User Root
  19. Storage of Secrets
  20. Private Key Abuse
  21. SSH
  22. TLS
  23. Credentials and Other Secrets
  24. Entered by People (manually)
  25. Entered by Software (automatically)
  26. Serverless
  27. Third Party Services
  28. Perimeterless
  29. Functions
  30. DoS of Lambda Functions
  31. Centralised logging of AWS Lambda Functions
  32. Frameworks
  33. Infrastructure and Configuration Management
  34. AWS
  35. Password-less sudo
  36. Additional Tooling

4. Risks that Solution Causes

  1. Shared Responsibility Model
  2. CSP Evaluation
  3. Cloud Service Provider vs In-house
  4. People
  5. Application Security
  6. Network Security
  7. Violations of Least Privilege
  8. Storage of Secrets
  9. Private Key Abuse
  10. SSH
  11. TLS
  12. Credentials and Other Secrets
  13. Entered by People (manually)
  14. Entered by Software (automatically)
  15. Serverless
  16. Functions
  17. DoS of Lambda Functions
  18. Frameworks
  19. Infrastructure and Configuration Management
  20. AWS
  21. Additional Tooling

5. Costs and Trade-offs

  1. Shared Responsibility Model
  2. CSP Evaluation
  3. Cloud Service Provider vs In-house
  4. People
  5. Application Security
  6. Network Security
  7. Violations of Least Privilege
  8. Storage of Secrets
  9. Private Key Abuse
  10. SSH
  11. TLS
  12. Credentials and Other Secrets
  13. Entered by People (manually)
  14. Entered by Software (automatically)
  15. Serverless
  16. Functions
  17. DoS of Lambda Functions
  18. Frameworks
  19. Infrastructure and Configuration Management
  20. AWS
  21. Additional Tooling

Additional Resources

Attributions

The Leanpub 60 Day 100% Happiness Guarantee

Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.

Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.

You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!

So, there's no reason not to click the Add to Cart button, is there?

See full terms...

Earn $8 on a $10 Purchase, and $16 on a $20 Purchase

We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.

(Yes, some authors have already earned much more than that on Leanpub.)

In fact, authors have earned over $14 million writing, publishing and selling on Leanpub.

Learn more about writing on Leanpub

Free Updates. DRM Free.

If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).

Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.

Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.

Learn more about Leanpub's ebook formats and where to read them

Write and Publish on Leanpub

You can use Leanpub to easily write, publish and sell in-progress and completed ebooks and online courses!

Leanpub is a powerful platform for serious authors, combining a simple, elegant writing and publishing workflow with a store focused on selling in-progress ebooks.

Leanpub is a magical typewriter for authors: just write in plain text, and to publish your ebook, just click a button. (Or, if you are producing your ebook your own way, you can even upload your own PDF and/or EPUB files and then publish with one click!) It really is that easy.

Learn more about writing on Leanpub