|
|
|||
|
||||
OverviewCloud Security: Authority, Modernity, and Technical Depth This book offers a definitive, framework-driven approach for security architects and leaders navigating the perimeterless, cloud-native landscape. It delivers a comprehensive methodology by harmonizing three core disciplines: Zero-Trust (ZT), the CIS Controls, and the ISO 27001 management system. Traditional security models, built on implicit trust, no longer suffice in environments defined by complexity and constant change. This guide provides the adaptable, verifiable framework needed to evolve faster than adversaries. It establishes security as a foundation for innovation, not just a cost center. About the Technology and Framework The book treats Zero-Trust as a mindset, requiring continuous verification and authorization for every access request, regardless of network location. It blends this philosophy with the technical ""how-to"" of the CIS Controls, a prioritized set of actions for rapid risk reduction. This technical implementation is governed by ISO 27001, which provides the strategic ""why"" and the Plan-Do-Check-Act (PDCA) cycle for continual security improvement. The text details implementation across critical Zero-Trust pillars: Identity and Access Management (IAM): Designing ""never-trust, always-verify"" models, implementing Multi-Factor Authentication (MFA) and Just-In-Time access. Segmentation: Building least-privilege microsegments and Software-Defined Perimeters (SDP) in the cloud. Automation: Automating CIS benchmark scans and enforcing consistent policy using Infrastructure as Code (IaC) across hybrid and multi-cloud environments. Future-Proofing: Preparing for next-gen threats with AI-driven detection and integrating Post-Quantum Cryptography (PQC) into cloud Key Management Services (KMS). For the Professional The content flows from risk assessment and gap analysis (Chapter 3) to advanced applications like securing Edge and Serverless functions (Chapter 12). You will find clear mapping of CIS Controls to ISO 27001 (Appendix B), tested Python code for automated workflows, and guidance for translating technical security metrics into clear business outcomes. This is the essential guide for Security Architects, Senior Engineers, and Security Leaders who need to design measurable, repeatable, and adaptive defenses. It offers the specific technical and organizational steps to make security architectures verifiably secure. Take command of your cloud and Zero-Trust journey. Start building verifiable, resilient defenses today. Full Product DetailsAuthor: John M WadePublisher: Independently Published Imprint: Independently Published Dimensions: Width: 17.80cm , Height: 0.70cm , Length: 25.40cm Weight: 0.227kg ISBN: 9798278441861Pages: 122 Publication Date: 12 December 2025 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Available To Order We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||