Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • MPI Ethno. Forsch.  (2)
  • MPI-MMG
  • MARKK
  • OLC Ethnologie
  • 2020-2024  (2)
  • 2005-2009
  • Birmingham, UK : Packt Publishing  (2)
  • Infonuagique ; Sécurité ; Mesures  (2)
Datenlieferant
  • MPI Ethno. Forsch.  (2)
  • MPI-MMG
  • MARKK
  • OLC Ethnologie
Materialart
Sprache
Erscheinungszeitraum
  • 2020-2024  (2)
  • 2005-2009
Jahr
  • 1
    ISBN: 9781837630707 , 1837630704 , 9781837638406
    Sprache: Englisch
    Seiten: 1 online resource (472 pages) , illustrations
    Paralleltitel: Erscheint auch als
    DDC: 004.67/82
    Schlagwort(e): Cloud computing Security measures ; Infonuagique ; Sécurité ; Mesures
    Kurzfassung: Strengthen your security posture in all aspects of CSPM technology, from security infrastructure design to implementation strategies, automation, and remedial actions using operational best practices across your cloud environment Key Features Choose the right CSPM tool to rectify cloud security misconfigurations based on organizational requirements Optimize your security posture with expert techniques for in-depth cloud security insights Improve your security compliance score by adopting a secure-by-design approach and implementing security automation Purchase of the print or Kindle book includes a free PDF eBook Book Description This book will help you secure your cloud infrastructure confidently with cloud security posture management (CSPM) through expert guidance that'll enable you to implement CSPM effectively, ensuring an optimal security posture across multi-cloud infrastructures. The book begins by unraveling the fundamentals of cloud security, debunking myths about the shared responsibility model, and introducing key concepts such as defense-in-depth, the Zero Trust model, and compliance. Next, you'll explore CSPM's core components, tools, selection criteria, deployment strategies, and environment settings, which will be followed by chapters on onboarding cloud accounts, dashboard customization, cloud assets inventory, configuration risks, and cyber threat hunting. As you progress, you'll get to grips with operational practices, vulnerability and patch management, compliance benchmarks, and security alerts. You'll also gain insights into cloud workload protection platforms (CWPPs). The concluding chapters focus on Infrastructure as Code (IaC) scanning, DevSecOps, and workflow automation, providing a thorough understanding of securing multi-cloud environments. By the end of this book, you'll have honed the skills to make informed decisions and contribute effectively at every level, from strategic planning to day-to-day operations. What you will learn Find out how to deploy and onboard cloud accounts using CSPM tools Understand security posture aspects such as the dashboard, asset inventory, and risks Explore the Kusto Query Language (KQL) and write threat hunting queries Explore security recommendations and operational best practices Get to grips with vulnerability, patch, and compliance management, and governance Familiarize yourself with security alerts, monitoring, and workload protection best practices Manage IaC scan policies and learn how to handle exceptions Who this book is for If you're a cloud security administrator, security engineer, or DevSecOps engineer, you'll find this book useful every step of the way--from proof of concept to the secured, automated implementation of CSPM with proper auto-remediation configuration. This book will also help cybersecurity managers, security leads, and cloud security architects looking to explore the decision matrix and key requirements for choosing the right product. Cloud security enthusiasts who want to enhance their knowledge to bolster the security posture of multi-cloud infrastructure will also benefit from this book.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Birmingham, UK : Packt Publishing
    ISBN: 9781801815536
    Sprache: Englisch
    Seiten: 1 online resource (478 pages) , color illustrations
    Ausgabe: Second edition.
    DDC: 004.67/82
    Schlagwort(e): Microsoft Azure (Computing platform) ; Cloud computing Security measures ; Infonuagique ; Sécurité ; Mesures ; Microsoft Azure (Computing platform) ; Electronic books
    Kurzfassung: Learn how to set up, configure, and use Microsoft Sentinel to provide security incident and event management services for your multi-cloud environment Key Features Collect, normalize, and analyze security information from multiple data sources Integrate AI, machine learning, built-in and custom threat analyses, and automation to build optimal security solutions Detect and investigate possible security breaches to tackle complex and advanced cyber threats Book Description Microsoft Sentinel is a security information and event management (SIEM) tool developed by Microsoft that helps you to integrate cloud security and artificial intelligence (AI). This book will enable you to implement Microsoft Sentinel and understand how it can help detect security incidents in your environment with integrated AI, threat analysis, and built-in and community-driven logic. The book begins by introducing you to Microsoft Sentinel and Log Analytics. You'll then get to grips with data collection and management, before learning how to create effective Microsoft Sentinel queries to detect anomalous behaviors and activity patterns. Moving ahead, you'll learn about useful features such as entity behavior analytics and Microsoft Sentinel playbooks along with exploring the new bi-directional connector for ServiceNow. As you progress, you'll find out how to develop solutions that automate responses needed to handle security incidents. Finally, you'll grasp the latest developments in security, discover techniques to enhance your cloud security architecture, and explore how you can contribute to the security community. By the end of this Microsoft Sentinel book, you'll have learned how to implement Microsoft Sentinel to fit your needs and be able to protect your environment from cyber threats and other security issues. What you will learn Implement Log Analytics and enable Microsoft Sentinel and data ingestion from multiple sources Get to grips with coding using the Kusto Query Language (KQL) Discover how to carry out threat hunting activities in Microsoft Sentinel Connect Microsoft Sentinel to ServiceNow for automated ticketing Find out how to detect threats and create automated responses for immediate resolution Use triggers and actions with Microsoft Sentinel playbooks to perform automations Who this book is for If you are an IT professional with prior experience in other Microsoft security products and Azure and are now looking to expand your knowledge to incorporate Microsoft Sentinel, then this book is for you. Security experts using an alternative SIEM tool who want to adopt Microsoft Sentinel as an additional service or as a replacement will also find this book useful.
    Anmerkung: Online resource; title from title details screen (O’Reilly, viewed February 22, 2022)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...