Cloud Security Fundamentals : Building the Foundations for Secure Cloud Platforms

個数:1
紙書籍版価格
¥25,540
  • 電子書籍

Cloud Security Fundamentals : Building the Foundations for Secure Cloud Platforms

  • 著者名:Edwards, Jason
  • 価格 ¥16,311 (本体¥14,829)
  • Wiley(2026/02/09発売)
  • ポイント 148pt (実際に付与されるポイントはご注文内容確認画面でご確認下さい)
  • 言語:ENG
  • ISBN:9781394377732
  • eISBN:9781394377749

ファイル: /

Description

A hands-on toolkit for securing contemporary cloud environments

In Cloud Security Fundamentals: Building the Foundations for Secure Cloud Platforms, cybersecurity leader and educator, Jason Edwards, delivers a comprehensive guide to safeguarding data, applications, and infrastructure in the cloud. The author offers a complete walkthrough of cloud security, moving from foundational concepts to advanced, forward-looking practices.

The book is filled with practical examples, hands-on guidance, and lessons drawn from real-world cloud security incidents and breaches. It equips readers with the tools and knowledge they need to defend against threats in cloud environments and how to understand coming developments in cloud technology that will impact organizations in all industries.

Inside the book:

  • A thorough introduction to cloud-native and advanced security practices for contemporary firms
  • A chapter on relevant cloud security certifications and professional growth advice
  • Practical discussions of foundational concepts in cloud security, including IAM, Zero Trust, and DevSecOps
  • Complete treatments of advanced cloud security themes, like leadership strategies, operational best practices, and techniques for dealing with common and emerging threats

Perfect for cloud security professionals, IT managers, and DevOps professionals, Cloud Security Fundamentals will also benefit system administrators, compliance and risk officers, consultants, auditors, and technology students in a variety of fields who require a foundational understanding of cloud security concepts.

Table of Contents

Preface xiii

Acknowledgments xv

1 The Strategic Importance of Cloud Security 1

Cloud as the Default Operating Model 1

Business Drivers and Return on Security Investment 3

Evolving Risk Landscape in Cloud Contexts 5

Misconceptions and Shared Responsibility Realities 7

Cloud Security as a Business Enabler 9

Strategic Alignment Between Security and Enterprise Goals 11

Conclusion 13

Recommendations 14

2 Foundations of Cloud Computing 15

Historical Roots and Computing Paradigms 15

Core Cloud Service Models 16

Deployment Models 18

Enabling Technologies: APIs, Virtualization, and Containers 21

IaC and Automation Foundations 23

Cloud Economic Models and Abstraction Layers 25

Cloud Provider Ecosystems and Market Differentiation 27

Conclusion 29

Recommendations 29

3 The Modern Cloud Security Landscape 31

Emerging Threats in Cloud Environments 31

Cloud-specific Vulnerabilities and Attack Vectors 33

Deep Dive: Shared Responsibility Model by Service Tier 35

Limitations of Legacy Security Models in Cloud Contexts 37

Security Investment Patterns and Innovation Drivers 39

Cloud Security Maturity and Adoption Models 41

Conclusion 44

Recommendations 44

4 Secure Cloud Architecture and Design 47

Secure-by-design Principles for Cloud Infrastructure 47

Identity, Trust Boundaries, and Access Zones 49

Resilience, Redundancy, and High-availability Design 50

Secure Networking and Micro-segmentation Models 52

Data Flow Mapping, Isolation, and Asset Tiering 54

Avoiding Cloud Security Anti-patterns 57

Compliance-ready Architectural Planning 59

Conclusion 61

Recommendations 62

5 Identity and Access Management (IAM) in the Cloud 65

Identity as the Security Perimeter 65

Authentication Protocols and Adaptive Techniques 66

Authorization Models: RBAC, ABAC, and Fine-grained Access 68

Privileged Access Management (PAM) at Cloud Scale 70

Lifecycle Automation for Identity Provisioning and Decommissioning 72

IAM Risks: Misconfigurations, Sprawl, and Abuse 74

Foundational IAM Architecture and Operational Best Practices 76

Conclusion 79

Recommendations 79

6 Securing Data in Cloud Environments 81

Data Classification and Inventory Across Cloud Assets 81

Encryption in Transit, at Rest, and in Use 83

Key Management: HSMs, KMS, Rotation, and Escrow 85

Data Residency, Sovereignty, and Jurisdictional Compliance 87

Backup, Archival, and Disaster Recovery for Data 89

DLP and Leak Surface Reduction 91

Conclusion 93

Recommendations 93

7 Monitoring, Detection, and Incident Management 95

Foundations of Logging and Security Telemetry in the Cloud 95

Threat Detection: Real-time Event Correlation and Context 97

Security Monitoring Across Multicloud Architectures 99

Incident Detection and Early Escalation Strategies 101

Automation and Orchestration in Incident Response 103

Metrics, KPIs, and Threat Intelligence Integration 104

Post-Incident Review and Root Cause Analysis 107

Conclusion 109

Recommendations 110

8 Security Automation and DevSecOps 113

DevSecOps Principles and Security Integration Models 113

Secure CI/CD Pipeline Design and Control Points 115

IaC Security and Policy-as-Code 117

Managing Secrets in Automated Development Workflows 119

Automating Compliance Validation in Build Pipelines 120

Governance Enforcement Through DevSecOps Tooling 123

Conclusion 124

Recommendations 125

9 Advanced Architectures and Specialized Domains 127

Container Security and Kubernetes Hardening 127

Serverless and Event-driven Architecture Security 129

API Security: Design, Authentication, and Rate Limiting 131

Supply Chain and Dependency Risk in Cloud Applications 134

Implementing Zero Trust in Cloud-native Environments 136

Security for Edge, IoT, and Distributed Cloud Models 138

Resilience Engineering and Chaos Security Practices 140

Conclusion 143

Recommendations 143

10 Cloud Governance, Risk, and Compliance (GRC) 145

Foundations of Cloud Governance Structures 145

Enterprise Cloud Risk Management Frameworks 148

Mapping Regulatory Frameworks to Cloud Controls 150

Cloud Audit Preparedness and Evidence Collection 152

SaaS and Third-party Governance Risk Strategies 154

Conclusion 157

Recommendations 157

11 Cloud Hardening and Configuration Management 159

Core Principles of Secure Configuration and Hardening 159

Baseline Standards for Operating Systems and VMs 161

Container and Kubernetes Configuration Security 164

Hardening PaaS and Managed Cloud Services 165

Endpoint, Client, and Remote Access Configuration 167

IaC for Baseline Enforcement 170

Continuous Validation and Drift Detection Workflows 172

Conclusion 175

Recommendations 175

12 Cloud Security Testing and Validation 177

Security Testing Methodologies in Cloud Contexts 177

Continuous Vulnerability Assessment and Remediation 179

Cloud-aware Penetration Testing and Provider Constraints 181

Security Testing in DevSecOps Pipelines (SAST/DAST/IAST) 183

External Testing, Bug Bounties, and Researcher Coordination 186

Purple Teaming, Simulated Attacks, and Threat-informed Defense 187

Conclusion 190

Recommendations 190

13 Secrets Management and Sensitive Asset Protection 193

Defining Secrets and Sensitive Credentials in the Cloud 193

Secure Secrets Lifecycle: Creation to Deletion 195

Centralized vs. Decentralized Secrets Management Models 197

Secrets Management in DevOps and CI/CD Workflows 199

JIT Access and Privileged Credential Rotation 201

Automating Secrets Management at Scale 203

Conclusion 205

Recommendations 205

14 Cloud Network Security 207

Virtual Networking Foundations and Isolation Models 207

Network Segmentation, Routing, and Secure Zones 209

Cloud Firewall Configuration and Access Control Enforcement 211

Web Application Firewalls (WAF) and API Gateway Security 214

Secure Remote Access and Hybrid Connectivity Architectures 216

Traffic Logging, Packet Inspection, and Anomaly Detection 218

Distributed Denial of Service (DDoS) Protection, SDN, and Edge Network Security Techniques 221

Conclusion 223

Recommendations 223

15 Identity Federation and Multicloud Access Integration 225

Identity Federation Concepts and Cross-domain Trust Models 225

Federation Protocols: SAML, OAuth, and OIDC 226

Federation Architecture in Multicloud and Hybrid Environments 229

Designing Secure and Scalable SSO Systems 231

Securing Federated Sessions, Assertions, and Tokens 232

Governance, Logging, and Compliance for Federated Access 234

Conclusion 236

Recommendations 237

16 Serverless and Microservices Security 239

Core Concepts of Serverless and Microservices Architectures 239

Shared Responsibility in Serverless Execution Models 241

Authentication and Authorization Across Microservices 242

API Gateway Protection and Request Validation Techniques 244

Securing Events, Queues, and Triggers in Asynchronous Systems 247

Secrets and Data Handling in Ephemeral Execution Environments 250

Runtime Monitoring and Isolation for Distributed Workloads 252

Conclusion 254

Recommendations 255

17 Data Privacy, Residency, and Protection Obligations 257

Privacy Fundamentals in Cloud Contexts 257

Data Residency, Localization, and Jurisdictional Compliance 259

Applying Privacy by Design in Cloud Architectures 261

Minimization, Pseudonymization, and Retention Strategies 263

Subject Access Requests and Erasure Protocols 265

Privacy Risk Assessment and Breach Notification Planning 267

Conclusion 270

Recommendations 270

18 Cloud Compliance and Regulatory Readiness 273

Regulatory Scope and Interpretation for Cloud Services 273

Mapping Frameworks: FedRAMP, ISO 27017, CSA CCM, etc. 275

Navigating Multi-Jurisdictional and Industry-specific Regulations 277

Automated Compliance Monitoring and Control Validation 279

Evidence Collection, Documentation, and Control Traceability 281

Cloud Vendor Compliance Oversight and Attestation Review 284

Strategic Compliance Roadmapping and Governance Alignment 286

Conclusions 288

Recommendations 289

19 Cloud Risk Management and Enterprise Integration 291

Identifying and Categorizing Cloud Risk Vectors 291

Embedding Cloud Risk into Enterprise Risk Frameworks 293

Risk Quantification, Prioritization, and Response Planning 295

Third-party, SaaS, and Supply Chain Risk Management 297

Shadow IT, Unmanaged Assets, and Risk Discovery Techniques 299

Conclusion 302

Recommendations 302

20 Cloud Monitoring, Logging, and Detection 305

Principles of Observability in Cloud Infrastructure 305

Centralized Logging Strategies Across Providers 306

Real-Time Detection and Correlation with Native and Third-Party Tools 308

Cloud SIEM, SOAR, and Automation Integration 310

Behavioral Analytics and Anomaly Detection in Cloud Workloads 312

Alert Tuning, Prioritization, and False Positive Reduction 314

Maturity Models for Telemetry, Visibility, and Incident Readiness 316

Conclusion 318

Recommendations 319

21 Cloud Security Metrics and Performance Reporting 321

Aligning Metrics with Business and Security Objectives 321

Operational and Technical Metrics for Cloud Security Operations 323

Compliance, Audit, and Control Effectiveness Indicators 325

Tracking Remediation, Drift, and Security Posture Trends 327

Maturity Models and Continuous Metrics Optimization 329

Conclusion 331

Recommendations 331

22 Threat Intelligence and Attack Surface Management 333

Strategic Role of Threat Intelligence in Cloud Security 333

Discovering and Mapping the Cloud Attack Surface 335

Curating and Consuming External Intelligence Feeds 336

Threat Modeling, Attribution, and Prioritization 338

Integrating Threat Intelligence into Detection and Response 340

Monitoring Internal and External Attack Vectors Continuously 343

Collaborative Intelligence Sharing and Operational Integration 345

Conclusion 348

Recommendations 348

23 Incident Response in Cloud Environments 351

Cloud-Aware Incident Response Planning and Governance 351

Role Definitions, Escalation Protocols, and Communication Plans 353

Detection, Validation, and Incident Categorization 355

Containment, Eradication, and Cloud-Scale Recovery 357

Forensic Considerations and Evidence Preservation 359

Post-Incident Review, RCA, and Corrective Actions 361

Integration of IR Playbooks with Cloud Automation and Orchestration 363

Conclusion 365

Recommendations 365

24 Cloud Forensics and Legal Considerations 367

Foundations of Digital Forensics in Cloud Contexts 367

Forensic Readiness: Controls, Logging, and Preservation Practices 369

Integration of Forensics into Security Operations Centers (SOCs) and IR 371

Jurisdiction, Chain of Custody, and Legal Admissibility 373

Collaborating with Cloud Providers During Investigations 375

Regulatory Expectations for Investigations and Reporting 377

Emerging Tools, Standards, and Future Forensic Models 380

Conclusion 382

Recommendations 382

25 Disaster Recovery and Business Continuity in the Cloud 385

Strategic Foundations of Cloud DR and BCP Planning 385

Cloud DR Models: Backup, Pilot Light, Warm Standby, and Active-Active 387

Identifying Critical Assets and Defining Recovery Objectives 390

Automated Testing and Validation of DR Plans 392

Ensuring Service Continuity for Distributed Cloud Systems 393

Integration of DR with Resilience, Chaos Engineering, and Automation 396

Maintaining Operational Continuity During Service Disruptions or Failures 398

Conclusion 401

Recommendations 401

26 AI-driven Cloud Security and Automation 403

Core Concepts of AI and ML in Cloud Security 403

AI-enhanced Threat Detection and Behavioral Analysis 405

Predictive Risk Modeling and Security Forecasting 407

Autonomous Incident Response and Workflow Optimization 409

AI-augmented Monitoring and Security Visibility 411

Conclusions 413

Recommendations 414

27 Quantum-Ready Security for Cloud Infrastructures 417

Quantum Computing Fundamentals and Cloud Implications 417

Cryptographic Vulnerabilities and Quantum Threat Timelines 419

PQC: Transition Strategies 421

QKD and Next-Gen Encryption Models 424

Inventorying and Replacing Classical Cryptographic Dependencies 426

Conclusion 427

Recommendations 428

28 Securing Cloud-integrated IoT and Edge Computing 431

Defining Cloud–Edge and IoT Integration Models 431

Unique Threats in Edge and Distributed Environments 433

Lifecycle Management for Devices and Firmware Security 435

Hardening Edge Infrastructure and Protecting Data Flows 437

Secure Connectivity Between Cloud, Edge, and Devices 439

Conclusion 442

Recommendations 442

Index 445

最近チェックした商品