eBooks & Reports

O'Reilly's Automating Security in the Cloud

Issue link: https://resources.threatstack.com/i/872576

Contents of this Issue

Navigation

Page 4 of 32

Table of Contents 4. Cloud Computing Foundational Security Leading Practices . . . . . . . . . . . . . . . . . . . . . . . . 5 Identity & Access Management (IAM) 6 Identity and access Management in cloud 7 Least privilege access 7 Benefits of LEAST principle in cloud: 8 Grant least privilege (Implementation) 8 Types of security credentials in cloud 10 Multi-factor authentication 11 Multi-Factor authentication (MFA) in cloud. 11 U2F Advantages 13 Partners for Secure Cloud Identity & Access Management 14 The U2F Attestation 16 Free Open Source Code and Servers 16 Cloud security foundation architecture 16 Authoritative source—identity Management 17 IAM groups in the cloud 18 Leveraging Roles for elevated access 19 Creating and/or Updating Your Trail 21 Configuration Management - an overview of AWS Config 26 Continuously Record and Evaluate Configurations 26 Segregation of Duties (SOD)in the cloud 28 Allgress Insight Risk Management Suite 30 iii

Articles in this issue

view archives of eBooks & Reports - O'Reilly's Automating Security in the Cloud