Cloud Security Fundamentals
- Nyhet
Building the Foundations for Secure Cloud Platforms
AvJason Edwards,UK) Edwards, Jason (Birkbeck, University of London
1 669 kr
Beställningsvara. Skickas inom 7-10 vardagar. Fri frakt för medlemmar vid köp för minst 249 kr.
Produktinformation
- Utgivningsdatum2026-03-26
- FormatInbunden
- SpråkEngelska
- Antal sidor464
- FörlagJohn Wiley & Sons Inc
- ISBN9781394377732
Tillhör följande kategorier
Jason Edwards, PhD, is an experienced cybersecurity leader, advisor, and educator with more than 20 years’ experience in the technology industry. He has created comprehensive cybersecurity education programs encompassing foundational knowledge, hands-on experience, and industry-aligned curriculums.
- Preface xiiiAcknowledgments xv1 The Strategic Importance of Cloud Security 1Cloud as the Default Operating Model 1Business Drivers and Return on Security Investment 3Evolving Risk Landscape in Cloud Contexts 5Misconceptions and Shared Responsibility Realities 7Cloud Security as a Business Enabler 9Strategic Alignment Between Security and Enterprise Goals 11Conclusion 13Recommendations 142 Foundations of Cloud Computing 15Historical Roots and Computing Paradigms 15Core Cloud Service Models 16Deployment Models 18Enabling Technologies: APIs, Virtualization, and Containers 21IaC and Automation Foundations 23Cloud Economic Models and Abstraction Layers 25Cloud Provider Ecosystems and Market Differentiation 27Conclusion 29Recommendations 293 The Modern Cloud Security Landscape 31Emerging Threats in Cloud Environments 31Cloud-specific Vulnerabilities and Attack Vectors 33Deep Dive: Shared Responsibility Model by Service Tier 35Limitations of Legacy Security Models in Cloud Contexts 37Security Investment Patterns and Innovation Drivers 39Cloud Security Maturity and Adoption Models 41Conclusion 44Recommendations 444 Secure Cloud Architecture and Design 47Secure-by-design Principles for Cloud Infrastructure 47Identity, Trust Boundaries, and Access Zones 49Resilience, Redundancy, and High-availability Design 50Secure Networking and Micro-segmentation Models 52Data Flow Mapping, Isolation, and Asset Tiering 54Avoiding Cloud Security Anti-patterns 57Compliance-ready Architectural Planning 59Conclusion 61Recommendations 625 Identity and Access Management (IAM) in the Cloud 65Identity as the Security Perimeter 65Authentication Protocols and Adaptive Techniques 66Authorization Models: RBAC, ABAC, and Fine-grained Access 68Privileged Access Management (PAM) at Cloud Scale 70Lifecycle Automation for Identity Provisioning and Decommissioning 72IAM Risks: Misconfigurations, Sprawl, and Abuse 74Foundational IAM Architecture and Operational Best Practices 76Conclusion 79Recommendations 796 Securing Data in Cloud Environments 81Data Classification and Inventory Across Cloud Assets 81Encryption in Transit, at Rest, and in Use 83Key Management: HSMs, KMS, Rotation, and Escrow 85Data Residency, Sovereignty, and Jurisdictional Compliance 87Backup, Archival, and Disaster Recovery for Data 89DLP and Leak Surface Reduction 91Conclusion 93Recommendations 937 Monitoring, Detection, and Incident Management 95Foundations of Logging and Security Telemetry in the Cloud 95Threat Detection: Real-time Event Correlation and Context 97Security Monitoring Across Multicloud Architectures 99Incident Detection and Early Escalation Strategies 101Automation and Orchestration in Incident Response 103Metrics, KPIs, and Threat Intelligence Integration 104Post-Incident Review and Root Cause Analysis 107Conclusion 109Recommendations 1108 Security Automation and DevSecOps 113DevSecOps Principles and Security Integration Models 113Secure CI/CD Pipeline Design and Control Points 115IaC Security and Policy-as-Code 117Managing Secrets in Automated Development Workflows 119Automating Compliance Validation in Build Pipelines 120Governance Enforcement Through DevSecOps Tooling 123Conclusion 124Recommendations 1259 Advanced Architectures and Specialized Domains 127Container Security and Kubernetes Hardening 127Serverless and Event-driven Architecture Security 129API Security: Design, Authentication, and Rate Limiting 131Supply Chain and Dependency Risk in Cloud Applications 134Implementing Zero Trust in Cloud-native Environments 136Security for Edge, IoT, and Distributed Cloud Models 138Resilience Engineering and Chaos Security Practices 140Conclusion 143Recommendations 14310 Cloud Governance, Risk, and Compliance (GRC) 145Foundations of Cloud Governance Structures 145Enterprise Cloud Risk Management Frameworks 148Mapping Regulatory Frameworks to Cloud Controls 150Cloud Audit Preparedness and Evidence Collection 152SaaS and Third-party Governance Risk Strategies 154Conclusion 157Recommendations 15711 Cloud Hardening and Configuration Management 159Core Principles of Secure Configuration and Hardening 159Baseline Standards for Operating Systems and VMs 161Container and Kubernetes Configuration Security 164Hardening PaaS and Managed Cloud Services 165Endpoint, Client, and Remote Access Configuration 167IaC for Baseline Enforcement 170Continuous Validation and Drift Detection Workflows 172Conclusion 175Recommendations 17512 Cloud Security Testing and Validation 177Security Testing Methodologies in Cloud Contexts 177Continuous Vulnerability Assessment and Remediation 179Cloud-aware Penetration Testing and Provider Constraints 181Security Testing in DevSecOps Pipelines (SAST/DAST/IAST) 183External Testing, Bug Bounties, and Researcher Coordination 186Purple Teaming, Simulated Attacks, and Threat-informed Defense 187Conclusion 190Recommendations 19013 Secrets Management and Sensitive Asset Protection 193Defining Secrets and Sensitive Credentials in the Cloud 193Secure Secrets Lifecycle: Creation to Deletion 195Centralized vs. Decentralized Secrets Management Models 197Secrets Management in DevOps and CI/CD Workflows 199JIT Access and Privileged Credential Rotation 201Automating Secrets Management at Scale 203Conclusion 205Recommendations 20514 Cloud Network Security 207Virtual Networking Foundations and Isolation Models 207Network Segmentation, Routing, and Secure Zones 209Cloud Firewall Configuration and Access Control Enforcement 211Web Application Firewalls (WAF) and API Gateway Security 214Secure Remote Access and Hybrid Connectivity Architectures 216Traffic Logging, Packet Inspection, and Anomaly Detection 218Distributed Denial of Service (DDoS) Protection, SDN, and Edge Network Security Techniques 221Conclusion 223Recommendations 22315 Identity Federation and Multicloud Access Integration 225Identity Federation Concepts and Cross-domain Trust Models 225Federation Protocols: SAML, OAuth, and OIDC 226Federation Architecture in Multicloud and Hybrid Environments 229Designing Secure and Scalable SSO Systems 231Securing Federated Sessions, Assertions, and Tokens 232Governance, Logging, and Compliance for Federated Access 234Conclusion 236Recommendations 23716 Serverless and Microservices Security 239Core Concepts of Serverless and Microservices Architectures 239Shared Responsibility in Serverless Execution Models 241Authentication and Authorization Across Microservices 242API Gateway Protection and Request Validation Techniques 244Securing Events, Queues, and Triggers in Asynchronous Systems 247Secrets and Data Handling in Ephemeral Execution Environments 250Runtime Monitoring and Isolation for Distributed Workloads 252Conclusion 254Recommendations 25517 Data Privacy, Residency, and Protection Obligations 257Privacy Fundamentals in Cloud Contexts 257Data Residency, Localization, and Jurisdictional Compliance 259Applying Privacy by Design in Cloud Architectures 261Minimization, Pseudonymization, and Retention Strategies 263Subject Access Requests and Erasure Protocols 265Privacy Risk Assessment and Breach Notification Planning 267Conclusion 270Recommendations 27018 Cloud Compliance and Regulatory Readiness 273Regulatory Scope and Interpretation for Cloud Services 273Mapping Frameworks: FedRAMP, ISO 27017, CSA CCM, etc. 275Navigating Multi-Jurisdictional and Industry-specific Regulations 277Automated Compliance Monitoring and Control Validation 279Evidence Collection, Documentation, and Control Traceability 281Cloud Vendor Compliance Oversight and Attestation Review 284Strategic Compliance Roadmapping and Governance Alignment 286Conclusions 288Recommendations 28919 Cloud Risk Management and Enterprise Integration 291Identifying and Categorizing Cloud Risk Vectors 291Embedding Cloud Risk into Enterprise Risk Frameworks 293Risk Quantification, Prioritization, and Response Planning 295Third-party, SaaS, and Supply Chain Risk Management 297Shadow IT, Unmanaged Assets, and Risk Discovery Techniques 299Conclusion 302Recommendations 30220 Cloud Monitoring, Logging, and Detection 305Principles of Observability in Cloud Infrastructure 305Centralized Logging Strategies Across Providers 306Real-Time Detection and Correlation with Native and Third-Party Tools 308Cloud SIEM, SOAR, and Automation Integration 310Behavioral Analytics and Anomaly Detection in Cloud Workloads 312Alert Tuning, Prioritization, and False Positive Reduction 314Maturity Models for Telemetry, Visibility, and Incident Readiness 316Conclusion 318Recommendations 31921 Cloud Security Metrics and Performance Reporting 321Aligning Metrics with Business and Security Objectives 321Operational and Technical Metrics for Cloud Security Operations 323Compliance, Audit, and Control Effectiveness Indicators 325Tracking Remediation, Drift, and Security Posture Trends 327Maturity Models and Continuous Metrics Optimization 329Conclusion 331Recommendations 33122 Threat Intelligence and Attack Surface Management 333Strategic Role of Threat Intelligence in Cloud Security 333Discovering and Mapping the Cloud Attack Surface 335Curating and Consuming External Intelligence Feeds 336Threat Modeling, Attribution, and Prioritization 338Integrating Threat Intelligence into Detection and Response 340Monitoring Internal and External Attack Vectors Continuously 343Collaborative Intelligence Sharing and Operational Integration 345Conclusion 348Recommendations 34823 Incident Response in Cloud Environments 351Cloud-Aware Incident Response Planning and Governance 351Role Definitions, Escalation Protocols, and Communication Plans 353Detection, Validation, and Incident Categorization 355Containment, Eradication, and Cloud-Scale Recovery 357Forensic Considerations and Evidence Preservation 359Post-Incident Review, RCA, and Corrective Actions 361Integration of IR Playbooks with Cloud Automation and Orchestration 363Conclusion 365Recommendations 36524 Cloud Forensics and Legal Considerations 367Foundations of Digital Forensics in Cloud Contexts 367Forensic Readiness: Controls, Logging, and Preservation Practices 369Integration of Forensics into Security Operations Centers (SOCs) and IR 371Jurisdiction, Chain of Custody, and Legal Admissibility 373Collaborating with Cloud Providers During Investigations 375Regulatory Expectations for Investigations and Reporting 377Emerging Tools, Standards, and Future Forensic Models 380Conclusion 382Recommendations 38225 Disaster Recovery and Business Continuity in the Cloud 385Strategic Foundations of Cloud DR and BCP Planning 385Cloud DR Models: Backup, Pilot Light, Warm Standby, and Active-Active 387Identifying Critical Assets and Defining Recovery Objectives 390Automated Testing and Validation of DR Plans 392Ensuring Service Continuity for Distributed Cloud Systems 393Integration of DR with Resilience, Chaos Engineering, and Automation 396Maintaining Operational Continuity During Service Disruptions or Failures 398Conclusion 401Recommendations 40126 AI-driven Cloud Security and Automation 403Core Concepts of AI and ML in Cloud Security 403AI-enhanced Threat Detection and Behavioral Analysis 405Predictive Risk Modeling and Security Forecasting 407Autonomous Incident Response and Workflow Optimization 409AI-augmented Monitoring and Security Visibility 411Conclusions 413Recommendations 41427 Quantum-Ready Security for Cloud Infrastructures 417Quantum Computing Fundamentals and Cloud Implications 417Cryptographic Vulnerabilities and Quantum Threat Timelines 419PQC: Transition Strategies 421QKD and Next-Gen Encryption Models 424Inventorying and Replacing Classical Cryptographic Dependencies 426Conclusion 427Recommendations 42828 Securing Cloud-integrated IoT and Edge Computing 431Defining Cloud–Edge and IoT Integration Models 431Unique Threats in Edge and Distributed Environments 433Lifecycle Management for Devices and Firmware Security 435Hardening Edge Infrastructure and Protecting Data Flows 437Secure Connectivity Between Cloud, Edge, and Devices 439Conclusion 442Recommendations 442Index 445
Mer från samma författare
Food, Politics, and Society
Alejandro Colas, Jason Edwards, Jane Levi, Sami Zubaida, Dr. Jason Edwards
979 kr
Food, Politics, and Society
Alejandro Colas, Jason Edwards, Jane Levi, Sami Zubaida, Dr. Jason Edwards
319 kr
La imaginación de Jasón - Spanish edition: Jason's Imagination: The Rain King
Jason Edwards
489 kr
Du kanske också är intresserad av
Cybersecurity Guide to Governance, Risk, and Compliance
Jason Edwards, Griffin Weaver, UK) Edwards, Jason (Birkbeck, University of London, Griffin (University of Utah; Brigham Young University) Weaver
1 389 kr
Cybersecurity Control Playbook
Jason Edwards, UK) Edwards, Jason (Birkbeck, University of London
1 429 kr
Retrieving The Big Society
Jason Edwards, UK) Edwards, Jason (Birkbeck, University of London
309 kr
Comprehensive Guide to the NIST Cybersecurity Framework 2.0
Jason Edwards, UK) Edwards, Jason (Birkbeck, University of London
1 559 kr
Building Effective Privacy Programs
Jason Edwards, Griffin Weaver, UK) Edwards, Jason (Birkbeck, University of London, Griffin (University of Utah; Brigham Young University) Weaver
1 399 kr
- Nyhet
Adversarial Machine Learning
Jason Edwards, UK) Edwards, Jason (Birkbeck, University of London
1 229 kr