My Account Log in

1 option

Cloud Security Fundamentals : Building the Foundations for Secure Cloud Platforms.

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Edwards, Jason.
Language:
English
Subjects (All):
Cloud computing--Security measures.
Physical Description:
1 online resource (467 pages)
Edition:
1st ed.
Place of Publication:
Newark : John Wiley & Sons, Incorporated, 2026.
Summary:
A hands-on toolkit for securing contemporary cloud environments In Cloud Security Fundamentals: Building the Foundations for Secure Cloud Platforms , cybersecurity leader and educator, Jason Edwards, delivers a comprehensive guide to safeguarding data, applications, and infrastructure in the cloud.
Contents:
Cover
Title Page
Copyright
Contents
Preface
Acknowledgments
1: The Strategic Importance of Cloud Security
Cloud as the Default Operating Model
Business Drivers and Return on Security Investment
Evolving Risk Landscape in Cloud Contexts
Misconceptions and Shared Responsibility Realities
Cloud Security as a Business Enabler
Strategic Alignment Between Security and Enterprise Goals
Conclusion
Recommendations
2: Foundations of Cloud Computing
Historical Roots and Computing Paradigms
Core Cloud Service Models
Deployment Models
Enabling Technologies: APIs, Virtualization, and Containers
IaC and Automation Foundations
Cloud Economic Models and Abstraction Layers
Cloud Provider Ecosystems and Market Differentiation
3: The Modern Cloud Security Landscape
Emerging Threats in Cloud Environments
Cloud-specific Vulnerabilities and Attack Vectors
Deep Dive: Shared Responsibility Model by Service Tier
Limitations of Legacy Security Models in Cloud Contexts
Security Investment Patterns and Innovation Drivers
Cloud Security Maturity and Adoption Models
4: Secure Cloud Architecture and Design
Secure-by-design Principles for Cloud Infrastructure
Identity, Trust Boundaries, and Access Zones
Resilience, Redundancy, and High-availability Design
Secure Networking and Micro-segmentation Models
Data Flow Mapping, Isolation, and Asset Tiering
Avoiding Cloud Security Anti-patterns
Compliance-ready Architectural Planning
5: Identity and Access Management (IAM) in the Cloud
Identity as the Security Perimeter
Authentication Protocols and Adaptive Techniques
Authorization Models: RBAC, ABAC, and Fine-grained Access.
Privileged Access Management (PAM) at Cloud Scale
Lifecycle Automation for Identity Provisioning and Decommissioning
IAM Risks: Misconfigurations, Sprawl, and Abuse
Foundational IAM Architecture and Operational Best Practices
6: Securing Data in Cloud Environments
Data Classification and Inventory Across Cloud Assets
Encryption in Transit, at Rest, and in Use
Key Management: HSMs, KMS, Rotation, and Escrow
Data Residency, Sovereignty, and Jurisdictional Compliance
Backup, Archival, and Disaster Recovery for Data
DLP and Leak Surface Reduction
7: Monitoring, Detection, and Incident Management
Foundations of Logging and Security Telemetry in the Cloud
Threat Detection: Real-time Event Correlation and Context
Security Monitoring Across Multicloud Architectures
Incident Detection and Early Escalation Strategies
Automation and Orchestration in Incident Response
Metrics, KPIs, and Threat Intelligence Integration
Post-Incident Review and Root Cause Analysis
8: Security Automation and DevSecOps
DevSecOps Principles and Security Integration Models
Secure CI/CD Pipeline Design and Control Points
IaC Security and Policy-as-Code
Managing Secrets in Automated Development Workflows
Automating Compliance Validation in Build Pipelines
Governance Enforcement Through DevSecOps Tooling
9: Advanced Architectures and Specialized Domains
Container Security and Kubernetes Hardening
Serverless and Event-driven Architecture Security
API Security: Design, Authentication, and Rate Limiting
Supply Chain and Dependency Risk in Cloud Applications
Implementing Zero Trust in Cloud-native Environments
Security for Edge, IoT, and Distributed Cloud Models.
Resilience Engineering and Chaos Security Practices
10: Cloud Governance, Risk, and Compliance (GRC)
Foundations of Cloud Governance Structures
Enterprise Cloud Risk Management Frameworks
Mapping Regulatory Frameworks to Cloud Controls
Cloud Audit Preparedness and Evidence Collection
SaaS and Third-party Governance Risk Strategies
11: Cloud Hardening and Configuration Management
Core Principles of Secure Configuration and Hardening
Baseline Standards for Operating Systems and VMs
Container and Kubernetes Configuration Security
Hardening PaaS and Managed Cloud Services
Endpoint, Client, and Remote Access Configuration
IaC for Baseline Enforcement
Continuous Validation and Drift Detection Workflows
12: Cloud Security Testing and Validation
Security Testing Methodologies in Cloud Contexts
Continuous Vulnerability Assessment and Remediation
Cloud-aware Penetration Testing and Provider Constraints
Security Testing in DevSecOps Pipelines (SAST/DAST/IAST
External Testing, Bug Bounties, and Researcher Coordination
Purple Teaming, Simulated Attacks, and Threat-informed Defense
13: Secrets Management and Sensitive Asset Protection
Defining Secrets and Sensitive Credentials in the Cloud
Secure Secrets Lifecycle: Creation to Deletion
Centralized vs. Decentralized Secrets Management Models
Secrets Management in DevOps and CI/CD Workflows
JIT Access and Privileged Credential Rotation
Automating Secrets Management at Scale
14: Cloud Network Security
Virtual Networking Foundations and Isolation Models
Network Segmentation, Routing, and Secure Zones
Cloud Firewall Configuration and Access Control Enforcement.
Web Application Firewalls (WAF) and API Gateway Security
Secure Remote Access and Hybrid Connectivity Architectures
Traffic Logging, Packet Inspection, and Anomaly Detection
Distributed Denial of Service (DDoS) Protection, SDN, and Edge Network Security Techniques
15: Identity Federation and Multicloud Access Integration
Identity Federation Concepts and Cross-domain Trust Models
Federation Protocols: SAML, OAuth, and OIDC
Federation Architecture in Multicloud and Hybrid Environments
Designing Secure and Scalable SSO Systems
Securing Federated Sessions, Assertions, and Tokens
Governance, Logging, and Compliance for Federated Access
16: Serverless and Microservices Security
Core Concepts of Serverless and Microservices Architectures
Shared Responsibility in Serverless Execution Models
Authentication and Authorization Across Microservices
API Gateway Protection and Request Validation Techniques
Securing Events, Queues, and Triggers in Asynchronous Systems
Secrets and Data Handling in Ephemeral Execution Environments
Runtime Monitoring and Isolation for Distributed Workloads
17: Data Privacy, Residency, and Protection Obligations
Privacy Fundamentals in Cloud Contexts
Data Residency, Localization, and Jurisdictional Compliance
Applying Privacy by Design in Cloud Architectures
Minimization, Pseudonymization, and Retention Strategies
Subject Access Requests and Erasure Protocols
Privacy Risk Assessment and Breach Notification Planning
18: Cloud Compliance and Regulatory Readiness
Regulatory Scope and Interpretation for Cloud Services
Mapping Frameworks: FedRAMP, ISO 27017, CSA CCM, etc.
Navigating Multi-Jurisdictional and Industry-specific Regulations
Automated Compliance Monitoring and Control Validation
Evidence Collection, Documentation, and Control Traceability
Cloud Vendor Compliance Oversight and Attestation Review
Strategic Compliance Roadmapping and Governance Alignment
Conclusions
19: Cloud Risk Management and Enterprise Integration
Identifying and Categorizing Cloud Risk Vectors
Embedding Cloud Risk into Enterprise Risk Frameworks
Risk Quantification, Prioritization, and Response Planning
Third-party, SaaS, and Supply Chain Risk Management
Shadow IT, Unmanaged Assets, and Risk Discovery Techniques
20: Cloud Monitoring, Logging, and Detection
Principles of Observability in Cloud Infrastructure
Centralized Logging Strategies Across Providers
Real-Time Detection and Correlation with Native and Third-Party Tools
Cloud SIEM, SOAR, and Automation Integration
Behavioral Analytics and Anomaly Detection in Cloud Workloads
Alert Tuning, Prioritization, and False Positive Reduction
Maturity Models for Telemetry, Visibility, and Incident Readiness
21: Cloud Security Metrics and Performance Reporting
Aligning Metrics with Business and Security Objectives
Operational and Technical Metrics for Cloud Security Operations
Compliance, Audit, and Control Effectiveness Indicators
Tracking Remediation, Drift, and Security Posture Trends
Maturity Models and Continuous Metrics Optimization
22: Threat Intelligence and Attack Surface Management
Strategic Role of Threat Intelligence in Cloud Security
Discovering and Mapping the Cloud Attack Surface
Curating and Consuming External Intelligence Feeds.
Threat Modeling, Attribution, and Prioritization.
Notes:
Description based on publisher supplied metadata and other sources.
ISBN:
1-394-37776-2
1-394-37774-6
9781394377749
OCLC:
1573146411

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account