
Cloud Security
Managing Emerging Threats
Versandkostenfrei!
Erscheint vorauss. 2. Dezember 2025
119,99 €
inkl. MwSt.
PAYBACK Punkte
60 °P sammeln!
In an era when the cloud environment is facing new threats such as advanced phishing campaigns, data exfiltration, and zero-day attacks, its cybersecurity should be viewed from both an offensive and defensive perspective. Offensive security measures include penetration testing to discover authentication, authorization, and network access management issues in the cloud environment. The DevSecOps captures a shift-left approach to address security early in the software development life cycle. It covers static analysis, code reviews, software component analysis, and dynamic analysis with continuou...
In an era when the cloud environment is facing new threats such as advanced phishing campaigns, data exfiltration, and zero-day attacks, its cybersecurity should be viewed from both an offensive and defensive perspective. Offensive security measures include penetration testing to discover authentication, authorization, and network access management issues in the cloud environment. The DevSecOps captures a shift-left approach to address security early in the software development life cycle. It covers static analysis, code reviews, software component analysis, and dynamic analysis with continuous integration/continuous-deployment (CI/CD) used for deploying code in the cloud. Defensive security measures entail defense against emerging threats using vulnerability management using native tools and commercial vulnerability management software. Knowledge of threat modeling for cloud environments based on possible attack vectors and threat modeling tools specific to the cloud are essential. The book reviews the zero-trust model that deviates from the traditional definition of trust boundaries and validates all interactions in a cloud environment. The incident response life cycle is used to prepare for, identify, contain, and eradicate security threats in the cloud. The book discusses how automation and autonomous cyber defense tools based on Artificial Intelligence and Machine Learning and techniques can help resource-constrained security teams address cloud security at a scale. It also elaborates upon some helpful case studies on the practical deployment of cloud security solutions, their limitations, and lessons learned based on case-studies experience in cloud security.