Preface
- Description
- Purpose
- Reason
Introduction
1. Asset Identification
- Productivity
- Competitive Advantage
- Control
- Data
2. Identify Risks
- Shared Responsibility Model
- CSP Responsibility
- CSP Customer Responsibility
- CSP Evaluation
- Cloud Service Provider vs In-house
- Skills
- EULA
- Giving up Secrets
- Location of Data
- Vendor lock-in
- Possible Single Points of Failure
- Review Other Chapters
- People
- Application Security
- Network Security
- Violations of Least Privilege
- Machine Instance Single User Root
- CSP Account Single User Root
- Storage of Secrets
- Private Key Abuse
- SSH
- TLS
- Credentials and Other Secrets
- Entered by People (manually)
- Entered by Software (automatically)
- Serverless
- Third Party Services
- Perimeterless
- Functions
- DoS of Lambda Functions
- Infrastructure and Configuration Management
- AWS
- Password-less sudo
3. Countermeasures
- Shared Responsibility Model
- CSP Responsibility
- CSP Customer Responsibility
- CSP Evaluation
- Cloud Service Provider vs In-house
- Skills
- EULA
- Giving up Secrets
- Location of Data
- Vendor lock-in
- Possible Single Points of Failure
- Review Other Chapters
- People
- Application Security
- Network Security
- Violations of Least Privilege
- Machine Instance Single User Root
- CSP Account Single User Root
- Storage of Secrets
- Private Key Abuse
- SSH
- TLS
- Credentials and Other Secrets
- Entered by People (manually)
- Entered by Software (automatically)
- Serverless
- Third Party Services
- Perimeterless
- Functions
- DoS of Lambda Functions
- Centralised logging of AWS Lambda Functions
- Frameworks
- Infrastructure and Configuration Management
- AWS
- Password-less sudo
- Additional Tooling
4. Risks that Solution Causes
- Shared Responsibility Model
- CSP Evaluation
- Cloud Service Provider vs In-house
- People
- Application Security
- Network Security
- Violations of Least Privilege
- Storage of Secrets
- Private Key Abuse
- SSH
- TLS
- Credentials and Other Secrets
- Entered by People (manually)
- Entered by Software (automatically)
- Serverless
- Functions
- DoS of Lambda Functions
- Frameworks
- Infrastructure and Configuration Management
- AWS
- Additional Tooling
5. Costs and Trade-offs
- Shared Responsibility Model
- CSP Evaluation
- Cloud Service Provider vs In-house
- People
- Application Security
- Network Security
- Violations of Least Privilege
- Storage of Secrets
- Private Key Abuse
- SSH
- TLS
- Credentials and Other Secrets
- Entered by People (manually)
- Entered by Software (automatically)
- Serverless
- Functions
- DoS of Lambda Functions
- Frameworks
- Infrastructure and Configuration Management
- AWS
- Additional Tooling