Product description ※Please note that product information is not in full comprehensive meaning because of the machine translation.
Information Science
Where should I start to ensure the security of systems on the cloud? AWS Security, Its Concept and Practice Enterprise systems that used to focus on on-premise environments are now moving into cloud environments in earnest. In particular, migration to public clouds, which allow easy small start, has become quite common, but it is also true that security incidents that are unique to cloud environments, such as accidental disclosure of highly confidential information or improper configuration, have started to occur. In this modern age, system administrators and developers who focus on the cloud are required to learn not only the traditional "on-premise / cloud" security management but also the principles of "cloud-specific" security management. It is also necessary to correctly understand cloud-specific concepts such as a shared responsibility model. At the same time, it is also necessary to quickly respond to technological advances such as changes in development methods and acceleration of development speed that can be obtained by using the cloud. The approach to detect risks in real time and minimize business losses while keeping up with the ever-changing system configuration and functions, and the various types of logs that are output by the system, is called continuous security. The key to achieving continuous security is the handling of event data including various logs that are output by the system. If you read this book, you can learn how to use the logging that is necessary for continuous monitoring, aggregation, visualization, and exploratory analysis of the collected logs. Using AmazonWebService (one of the largest public cloud services) as an example, this book can be called a comprehensive and practical "textbook of cloud security" that introduces the basic knowledge and concepts, as well as the best practices of log utilization using managed services on AWS. - Contents -Chapter1 What Is Continuous Security? Chapter2 Logs Required for Continuous Monitoring? Chapter3 Log Utilization for Security? Chapter 4 Continuous Monitoring with AWS Services? Chapter 5 Security Detection Results Chapter6 Security Incident Investigation