Information science Continuous Security Practice Guide Creating a monitoring system by collecting and analyzing logs / Hisashi Hibino

※Please note that product information is not in full comprehensive meaning because of the machine translation.
Japanese title: 単行本(実用) 情報科学 AWS継続的セキュリティ実践ガイドログの収集/分析による監視体制の構築 / 日比野恒
3,828JPY
2,800JPY
0JPY
Quantity:
+
Add to wishlist
Item number: BO4105414
Released date: 22 Dec 2023
Maker: Shoeisha Co.

Product description ※Please note that product information is not in full comprehensive meaning because of the machine translation.

Information Science
Where should I start to ensure the security of systems on the cloud? AWS Security, Its Concept and Practice Enterprise systems that used to focus on on-premise environments are now moving into cloud environments in earnest. In particular, migration to public clouds, which allow easy small start, has become quite common, but it is also true that security incidents that are unique to cloud environments, such as accidental disclosure of highly confidential information or improper configuration, have started to occur. In this modern age, system administrators and developers who focus on the cloud are required to learn not only the traditional "on-premise / cloud" security management but also the principles of "cloud-specific" security management. It is also necessary to correctly understand cloud-specific concepts such as a shared responsibility model. At the same time, it is also necessary to quickly respond to technological advances such as changes in development methods and acceleration of development speed that can be obtained by using the cloud. The approach to detect risks in real time and minimize business losses while keeping up with the ever-changing system configuration and functions, and the various types of logs that are output by the system, is called continuous security. The key to achieving continuous security is the handling of event data including various logs that are output by the system. If you read this book, you can learn how to use the logging that is necessary for continuous monitoring, aggregation, visualization, and exploratory analysis of the collected logs. Using AmazonWebService (one of the largest public cloud services) as an example, this book can be called a comprehensive and practical "textbook of cloud security" that introduces the basic knowledge and concepts, as well as the best practices of log utilization using managed services on AWS. - Contents -Chapter1 What Is Continuous Security? Chapter2 Logs Required for Continuous Monitoring? Chapter3 Log Utilization for Security? Chapter 4 Continuous Monitoring with AWS Services? Chapter 5 Security Detection Results Chapter6 Security Incident Investigation