Linked e-resources
Details
Table of Contents
Chapter 1: Introduction to Cloud Computing Security
Chapter 2: Performing a Risk Assessment
Chapter 3: Securing the Code
Chapter 4: Securing Interfaces
Chapter 5: Configuring the Application Stack
Chapter 6: Restricting Permissions
Part IV: Monitoring and Alerting
Chapter 7: Account Management
Chapter 8: Secrets Management
Chapter 9: Authentication and Authorization
Chapter 10: Monitoring Security Events
Chapter 10: Protecting Sensitive Data
Chapter 11: Monitoring, Auditing, and Alerting
Chapter 12: Additional Considerations
Chapter 13: Finalizing the Risk Assessment.
Appendix A: List of Acronyms
Appendix B: Set Up Instructions
Appendix C: Exercises Review.
Chapter 2: Performing a Risk Assessment
Chapter 3: Securing the Code
Chapter 4: Securing Interfaces
Chapter 5: Configuring the Application Stack
Chapter 6: Restricting Permissions
Part IV: Monitoring and Alerting
Chapter 7: Account Management
Chapter 8: Secrets Management
Chapter 9: Authentication and Authorization
Chapter 10: Monitoring Security Events
Chapter 10: Protecting Sensitive Data
Chapter 11: Monitoring, Auditing, and Alerting
Chapter 12: Additional Considerations
Chapter 13: Finalizing the Risk Assessment.
Appendix A: List of Acronyms
Appendix B: Set Up Instructions
Appendix C: Exercises Review.