Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
DESCRIPTION
Cloud platforms face unique security issues and opportunities because of their evolving designs and API-driven automation. We will learn cloud-specific strategies for securing platforms such as AWS, Microsoft Azure, Google Cloud Platform, Oracle Cloud Infrastructure, and others. The book will help you implement data asset management, identity and access management, network security, vulnerability management, incident response, and compliance in your cloud environment.
WHAT WILL YOU LEARN
? Understand the critical role of Identity and Access Management (IAM) in cloud environments.
? Address different types of security vulnerabilities in the cloud.? Develop and apply effective incident response strategies for detecting, responding to, and recovering from security incidents.? Establish a robust and secure security system by selecting appropriate security solutions for your cloud ecosystem.
TABLE OF CONTENTS
SECTION I: Overview and Need to Transform to Cloud Landscape
Evolution of Cloud Computing and its Impact on Security
Understanding the Core Principles of Cloud Security and its Importance
Cloud Landscape Assessment and Choosing the Solution for Your Enterprise
SECTION II: Building Blocks of Cloud Security Framework and Adoption Path
Cloud Security Architecture and Implementation Framework
Native Cloud Security Controls and Building Blocks
Examine Regulatory Compliance and Adoption path for Cloud
Creating and Enforcing Effective Security Policies
SECTION III: Maturity Path
Leveraging Cloud-based Security Solutions for Security-as-a-Service
Cloud Security Recommendations and Best Practices
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
DESCRIPTION
Cloud platforms face unique security issues and opportunities because of their evolving designs and API-driven automation. We will learn cloud-specific strategies for securing platforms such as AWS, Microsoft Azure, Google Cloud Platform, Oracle Cloud Infrastructure, and others. The book will help you implement data asset management, identity and access management, network security, vulnerability management, incident response, and compliance in your cloud environment.
WHAT WILL YOU LEARN
? Understand the critical role of Identity and Access Management (IAM) in cloud environments.
? Address different types of security vulnerabilities in the cloud.? Develop and apply effective incident response strategies for detecting, responding to, and recovering from security incidents.? Establish a robust and secure security system by selecting appropriate security solutions for your cloud ecosystem.
TABLE OF CONTENTS
SECTION I: Overview and Need to Transform to Cloud Landscape
Evolution of Cloud Computing and its Impact on Security
Understanding the Core Principles of Cloud Security and its Importance
Cloud Landscape Assessment and Choosing the Solution for Your Enterprise
SECTION II: Building Blocks of Cloud Security Framework and Adoption Path
Cloud Security Architecture and Implementation Framework
Native Cloud Security Controls and Building Blocks
Examine Regulatory Compliance and Adoption path for Cloud
Creating and Enforcing Effective Security Policies
SECTION III: Maturity Path
Leveraging Cloud-based Security Solutions for Security-as-a-Service
Cloud Security Recommendations and Best Practices