Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Title Page Copyright
Enterprise Cloud Security and Governance
Credits About the Author About the Reviewer www.PacktPub.com
Why subscribe?
Customer Feedback Preface
What this book covers What you need for this book Who this book is for Conventions Reader feedback Customer support
Downloading the color images of this book  Errata Piracy Questions
The Fundamentals of Cloud Security
Getting started Service models
Software as a service Platform as a service Infrastructure as a service
Deployment models Cloud security Why is cloud security considered hard?
Our security posture
Virtualization – cloud's best friend
Understanding the ring architecture Hardware virtualization
Full virtualization with binary translation Paravirtualization Hardware-assisted virtualization
Distributed architecture in virtualization
Enterprise virtualization with oVirt
Encapsulation Point in time snapshots Isolation Risk assessment in cloud
Service Level Agreement Business Continuity Planning – Disaster Recovery (BCP/DR)
Business Continuity Planning Disaster Recovery Recovery Time Objective Recovery Point Objective Relation between RTO and RPO Real world use case of Disaster Recovery Use case to understand BCP/DR
Policies and governance in cloud Audit challenges in the cloud Implementation challenges for controls on CSP side Vulnerability assessment and penetration testing in the cloud
Use case of a hacked server
Summary
Defense in Depth Approach
The CIA triad
Confidentiality Integrity Availability
A use case Understanding all three aspects
The use case
Introducing Defense in Depth
First layer – network layer Second layer – platform layer Third layer – application layer Fourth layer – data layer Fifth layer – response layer
Summary
Designing Defensive Network Infrastructure
Why do we need cryptography? The TCP/IP model
Scenario
The Network Transport Layer The Internet Protocol Layer The Transport Layer The Application Layer
Firewalls
How a firewall works? How does a firewall inspect packets?
3-way handshake
Modes of firewall
Stateful packet inspection Stateless packet inspection
Architecting firewall rules
The deny all and allow some approach The allow all and deny some approach
Firewall justification document
A sample firewall justification document
Inbound rules Outbound rules
Tracking firewall changes with alarms
Best practices
Application layer security
Intrusion Prevention Systems
Overview architecture of IPS
IPS in a cloud environment Implementing IPS in the cloud
Deep Security
Anti-malware Application control
The IPS functionality
A real-world example Implementation
Advantages that IPS will bring to a cloud environment
A web application firewall
Architecture Implementation
Network segmentation
Understanding a flat network Segmented network Network segmentation in cloud environments Segmentation in cloud environments
Rule of thumb
Accessing management
Bastion hosts The workings of bastion hosts The workings of SSH agent forwarding Practical implementation of bastion hosts
Security of bastion hosts Benefits of bastion hosts Disadvantages of bastion hosts
Virtual Private Network
Routes – after VPN is connected
Installation of OpenVPN
Security for VPN Recommended tools for VPN
Approaching private hosted zones for DNS
Public hosted zones Private hosted zones
Challenge Solution
Summary
Server Hardening
The basic principle of host-based security Keeping systems up-to-date
The Windows update methodology The Linux update methodology Using the security functionality of YUM Approach for automatic security updates installation Developing a process to update servers regularly Knowledge base Challenges on a larger scale
Partitioning and LUKS
Partitioning schemes
A separate partition for /boot A separate partition for /tmp A separate partition for /home
Conclusion
LUKS
Introduction to LUKS
Solution Conclusion
Access control list
Use case Introduction to Access Control List
Set ACL Show ACL
Special permissions in Linux
SUID 
Use case for SUID Understanding the permission associated with ping Setting a SUID bit for files Removing the SUID bit for files
SETGID
Associating the SGID for files
SELinux
Introduction to SELinux Permission sets in SELinux SELinux modes Confinement of Linux users to SELinux users Process confinement
Conclusion
Hardening system services and applications
Hardening services
Guide for hardening SSH Enable multi-factor authentication
Associated configuration
Changing the SSH default port
Associate configuration
Disabling the root login
Associated configuration Conclusion
Pluggable authentication modules
Team Screen application File Sharing Application Understanding PAM The architecture of PAM
The PAM configuration The PAM command structure
Implementation scenario
Forcing strong passwords  Log all user commands
Conclusion
System auditing with auditd
Introduction to auditd
Use case 1 – tracking activity of important files
Use case Solution First field
Use case 2 - monitoring system calls
Introduction to system calls Use case Solution Conclusion Conclusion
Central identity server
Use Case 1 Use case 2
The architecture of IPA
Client-server architecture User access management Best practices to follow
Conclusion
Single sign-on
Idea solution Advantages of an SSO solution Challenges in the classic method of authentication Security Assertion Markup Language The high-level overview of working Choosing the right identity provider Building an SSO from scratch
Hosted Based Intrusion Detection System
Exploring OSSEC
File integrity monitoring Log monitoring and active response
Conclusion
The hardened image approach
Implementing hardening standards in scalable environments
Important to remember Conclusion
Summary
Cryptography Network Security
Introduction to cryptography
Integrity Authenticity
Real world scenario
Non-repudiation
Types of cryptography
Symmetric key cryptography
Stream cipher
The encryption process The decryption process
Advantages of stream ciphers
Block cipher (AES)
Padding Modes of block ciphers
Message authentication codes
The MAC approach
The challenges with symmetric key storage
Hardware security modules
The challenges with HSM in on-premise
A real-world scenario
HSM on the cloud
CloudHSM
Key management service
The basic working of AWS KMS Encrypting a function in KMS Decrypting a function in KMS
Implementation
Practical guide
Configuring AWS CLI
The decryption function
Envelope encryption
The encryption process The decryption process
Implementation steps
Practical implementation of envelope encryption
Credential management system with KMS
Implementation Best practices in key management
 Rotation life cycle for encryption keys Scenario 1–a single key for all data encryption Scenario 2–multiple keys for data encryption
Protecting the access keys Audit trail is important
Asymmetric key encryption 
The basic working
Authentication with the help of an asymmetric key
Digital signatures
The benefits and use cases of a digital signature
SSL/TLS
Scenario 1 – A man-in-the-middle attack–storing credentials Scenario 2 – A man-in-the-middle attack–integrity attacks Working of SSL/TLS
Client Hello Server Hello Certificate Server key exchange Server Hello done Client key exchange Change cipher spec
Security related to SSL/TLS
Grading TLS configuration with SSL Labs
Default Settings
Perfect forward secrecy
Implementation of perfect forward secrecy in nginx HTTP Strict Transport Security
Implementing HSTS in nginx
Verifying the integrity of a certificate
Online certificate status protocol OCSP stapling
Challenge 1 Challenge 2
An ideal solution
Architecture
Implementing TLS termination at the ELB level Selecting cipher suites Importing certificate
AWS certificate manager
Use case 1 Use case 2 Introduction to AWS Certificate Manager
Summary
Automation in Security
Configuration management
Ansible
Remote command execution
The structure of the Ansible playbook
Playbook for SSH hardening Running Ansible in dry mode
Run and rerun and rerun
Ansible mode of operations
Ansible pull
Attaining the desired state with Ansible pull
Auditing servers with Ansible notifications The Ansible Vault
Deploying the nginx Web Server
Solution
Ansible best practices
Terraform
Infrastructure migration Installing Terraform
Working with Terraform
Integrating Terraform with Ansible Terraform best practices
AWS Lambda
Cost optimization
Achieving a use case through AWS Lambda
Testing the Lambda function Start EC2 function Integrating the Lambda function with events
Summary
Vulnerability, Pentest, and Patch Management
Introduction to vulnerability assessment
Common Vulnerabilities and Exposures 
Common Vulnerability Scoring System (CVSS)
Understanding risks
Determining the likelihood Defining the impact
Risk mitigation
A sample scan report How a vulnerability scanner works
Best practices Patch management
Solution 1 Solution 2 Solution 3 Centralized patch management
Architecture
Installing the Spacewalk server Import the CentOS 7 repository Create activation keys Configuring clients Pushing updates to clients
Organizing servers in groups
Systems set manager The life cycle of patch management Important points to remember Best practices
Standardize the stacks All systems must be connected to Spacewalk Develop a back out plan Push in a systematic way
Rolling updates All at once
Challenges Containers and patch management
Introduction to Docker
Setting up Docker
Summary
Security Logging and Monitoring
Continuous security and monitoring
Real world scenario
Log monitoring is a must in security Key aspects of continuous security monitoring Operational considerations Understanding what is normal versus abnormal
Choosing the right log monitoring tool
Let's get started with logging and monitoring
VPC flow logs AWS Config
Configuring the AWS Config service Let's analyze the functionality Evaluating changes to resources
Security Incident and Event Management Log monitoring is reactive in nature
Best practices
Set the right base Structure your logs Transform granular events to high level Determine whom to notify when an event occurs
Summary
First Responder
Real world use case
Use case
Understanding the incident
Handling the incidents Incident response plan Preparation
Educate Stick to the plan
Incident response process
Preparation
Use case
Detection
Use case
Containment
Use case
Remediation
Use case
Recovery
Use case
Lessons learned
Use case
Insider threats
Use case
Early indications of insider threats
Holding unexpected simulation Summary
Best Practices
Cloud readiness Network readiness Server readiness Bonus points Summary
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion