Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/sciences-du-risque/automating-security-in-the-cloud/sandage/descriptif_3655532
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=3655532

Automating Security in the Cloud Modernizing Governance through Security Design

Langue : Anglais

Auteurs :

Couverture de l’ouvrage Automating Security in the Cloud
Automate the fundamental structure of your cloud account with reliable coded security and governance in an Amazon Web Services (AWS) environment. This practical guide shows security professionals, DevOps teams, and others responsible for securing workloads in the cloud how to capture, secure, and control specific infrastructure control elements.

You’ll learn how to deploy security compliant processes for IT elements, such as pre-defining and constraining the design of AWS Identify and Access Management (IAM), AWS Key Management Services (KMS), and AWS CloudTrail. The result is a formalized, repeatable, and verifiable process for automating governance workflows to construct, implement, and run secure workloads through directed, trustworthy, and ratified governance automations in the cloud.

- Learn how to design and automate security-leading practice for an AWS secure account set-up and security architecture
- Accelerate secure adoption of AWS services through automated prevent and detect controls
- Galvanize the use of partner’s services through integration, targeted guidance
- Train security practitioners on Modernizing Technology Governance preparations, training, and methods for automating AWS account design
- Chapter 1. Modernizing Technology Governance
- Chapter 2. Understand Your Requirements
- Chapter 3. Analyze and Document Your Cloud Deployment
- Chapter 4. Cloud Computing Foundation Security Leading Practices
- Chapter 5. Implementing Foundation Level Automation
- Chapter 6. Automating Security Operations
- Chapter 7. Cloud Network Security
- Chapter 8. Cloud Security Reference Architecture
- Chapter 9. Automate your cloud deployments
- Chapter 10. Deploy Security Automation and Monitor
- Chapter 11. Operational Secure Cloud Environment
- Chapter 12. Closing the cloud security sphere
- Chapter 13. Automation resources

Ouvrage de 450 p.

Publication abandonnée

Thème d’Automating Security in the Cloud :