Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen
Beschreibung

A hands-on roadmap to securing AWS, GCP, and Azure cloud containers

In Securing Cloud Containers: Building and Running Secure Cloud-Native Applications, a team of cloud security experts delivers a hands-on guide to securing containerized applications and cloud infrastructure, including Kubernetes. The book offers solutions to the most common obstacles and challenges faced by security professionals, DevOps engineers, and IT architects developing cloud applications.

You'll find step-by-step instructions you can apply immediately to develop secure containers alongside real-world examples of secure, cloud-native applications. The authors provide an accessible introduction to containers and Kubernetes and explain the architecture of containerized applications, best practices for container security, security automation tools, and cloud security AI techniques.

Securing Cloud Containers offers in-depth discussions of Zero Trust cloud models, walkthroughs of platform-specific tools for Azure, AWS, and GCP, and up-to-date introductions to SecDevOps in cloud-based containers, including frameworks for each of the three major cloud platforms. It's an invaluable and practical resource for IT system administrators, cloud engineers, cybersecurity and SecDevOps professionals, and other IT and security practitioners looking for an accurate cloud container roadmap that explains the "how" and the "why" of container security on AWS, GCP, and Azure.

A hands-on roadmap to securing AWS, GCP, and Azure cloud containers

In Securing Cloud Containers: Building and Running Secure Cloud-Native Applications, a team of cloud security experts delivers a hands-on guide to securing containerized applications and cloud infrastructure, including Kubernetes. The book offers solutions to the most common obstacles and challenges faced by security professionals, DevOps engineers, and IT architects developing cloud applications.

You'll find step-by-step instructions you can apply immediately to develop secure containers alongside real-world examples of secure, cloud-native applications. The authors provide an accessible introduction to containers and Kubernetes and explain the architecture of containerized applications, best practices for container security, security automation tools, and cloud security AI techniques.

Securing Cloud Containers offers in-depth discussions of Zero Trust cloud models, walkthroughs of platform-specific tools for Azure, AWS, and GCP, and up-to-date introductions to SecDevOps in cloud-based containers, including frameworks for each of the three major cloud platforms. It's an invaluable and practical resource for IT system administrators, cloud engineers, cybersecurity and SecDevOps professionals, and other IT and security practitioners looking for an accurate cloud container roadmap that explains the "how" and the "why" of container security on AWS, GCP, and Azure.

Über den Autor

SINA MANAVI is the Global Head of Cloud Security and Compliance at DHL IT Services.

ABBAS KUDRATI is Asia's Chief Identity Security Advisor at Silverfort. He is a former Chief Cybersecurity Advisor at Microsoft Asia and a Professor of Practice in Cybersecurity at LaTrobe University, Australia.

MUHAMMAD AIZUDDIN ZALI is a principal architect and team manager at DHL ITS for Secure Public Cloud Services - Container & Kafka Platform team.

Inhaltsverzeichnis

Foreword xxv

Introduction xxvii

Chapter 1 Introduction to Cloud-Based Containers 1

Cloud Café Story 1

The Story Continues: The Café's Expansion 2

The Cloud Kitchen Model 3

Making Cloud Kitchen a Success 3

How Containers Changed the Whole Game Plan 3

The New Hub of HiTechville 4

The Evolution of Cloud Infrastructure 4

The Era of Mainframes 4

The Rise of Virtualization 4

The Emergence of Cloud Services 5

The Shift to Containers 5

Introduction to Containers in Cloud Computing 6

The Role of Containers in Modern Cloud Computing 6

Virtual Machines Versus Containers in Cloud Environments 6

Benefits of Using Containers in Cloud 7

Popular Cloud Container Technologies 8

Overview of Cloud-Native Ecosystem for Containers 11

Summary 12

Chapter 2 Cloud-Native Kubernetes: Azure, GCP, and AWS 13

What Is Kubernetes? 15

Managed Kubernetes Services 17

Microsoft Azure Kubernetes Services 17

Google Kubernetes Engine 18

Amazon Elastic Kubernetes Service 19

Azure-, GCP-, and AWS-Managed Kubernetes Service Assessment Criteria 21

Azure, GCP, and AWS Cloud-Native Container Management Services 23

Summary 23

Chapter 3 Understanding the Threats Against Cloud-Based Containerized Environments 25

Initial Stage of Threat Modeling 25

The MITRE ATT&CK Framework 26

Threat Vectors 27

Tactic and Techniques in MITRE ATT&CK 27

Cloud Threat Modeling Using MITRE ATT&CK 31

Cloud Container Threat Modeling 37

Foundations of Cloud Container Threat Modeling 37

Kubernetes Control Plane: Securing the Orchestration Core 37

Worker Nodes: Securing the Execution Environment 38

Cluster Networking: Defending the Communication Fabric 39

Workloads: Hardening Containers and Application Logic 40

IAM: Enforcing Granular Access Across Layers 41

Persistent Storage: Securing Data at Rest 42

CI/CD Pipeline Security: Defending the DevOps Chain 42

Log Monitoring and Visibility: Detecting What Matters 43

Resource Abuse and Resiliency: Planning for the Worst 44

Resource Abuse: Unauthorized Exploitation of Cloud Resources 44

Resiliency and Business Continuity Planning in Kubernetes 46

Compliance and Governance 47

Summary 48

Chapter 4 Secure Cloud Container Platform and Container Runtime 49

Introduction to Cloud-Specific OS and Container Security 49

Cloud-Specific OS: A Shifting Paradigm How OS Should Work 50

Container Security Architecture 51

Host OS Hardening for Container Environments 53

Leverage Container-Optimized OSs 53

Establish and Maintain Secure Configuration Baselines 54

Implement Robust Access Controls and Authentication 55

Apply Timely Security Updates and Patches 55

Implement Host-Based Security Controls 56

Container Runtime Hardening 56

Minimal Container Images 56

Multistage Build 57

Drop Unnecessary Capabilities 57

Implement Seccomp Profiles 58

Resource Controls 59

Use Memory and CPU Limits 60

Process and File Restrictions 60

Logging and Monitoring 61

Regular Security Updates 62

Network Security 62

Implementing Kubernetes Network Policies (netpol) 64

Leveraging Service Mesh for Advanced Secure Communication 64

Leveraging Cloud Network Security Groups 66

Linux Kernel Security Feature for the Container Platform 67

Linux Namespaces, Control Groups, and Capabilities 68

OS-Specific Security Capabilities (SELinux, AppArmor) 69

Security Best Practices in Cloud Container Stack 70

Least Privilege (RBAC) and Resource Limitation for Azure, Gcp, Aws 71

Scanning and Verifying Images Using Cloud Services 72

Compliance and Governance in Cloud Environments 73

Meeting Regulatory Compliance (PCI-DSS, HIPAA) for Containerized Workload 73

Tools to Help Meet Compliance 76

Cloud-Native Security Benchmarks and Certifications 76

Future Trends and Emerging Standards in Cloud-Native Security 78

AI and Machine Learning Security Standards 79

Automated Compliance and Continuous Assessment 79

Summary 81

Chapter 5 Secure Application Container Security in the Cloud 83

Securing Containerized Applications in Cloud Container Platforms 83

Shared Responsibility Model 84

Image Security 84

Network Security 85

Threat Intelligence for Cloud-Native Containers 87

CI/CD Security in Cloud-Based Container Pipelines 90

Shifting Left and Managing Privileges in Azure DevOps, Google Cloud Build, and AWS CodePipeline 91

Azure DevOps 91

Google Cloud Build 92

AWS CodePipeline 93

Penetration Testing for Cloud-Based Containers 94

Supply Chain Risks and Best Practices in the Cloud 95

Securing Container Registries in the Cloud (ACR, ECR, GCR) 97

Image Signing and Verification in Cloud Platforms 98

Role-Based Access Control in Cloud Supply Chains 99

Summary 101

Chapter 6 Secure Monitoring in Cloud-Based Containers 103

Introduction to Secure Container Monitoring 103

Key Monitoring Enablement Business Goals 104

Enabling Cost Efficiency 104

Supporting Compliance and Audit Readiness 104

Enhancing Incident Response 105

Ensuring High Availability 106

Continuous Risk Identification and Remediation 106

Driving Strategic Decision-Making 108

Challenges in Monitoring Cloud-Based Containers 108

Ephemeral Workloads 108

Distributed Architectures 109

Data Volume and Noise 109

Security Considerations in Container Monitoring 110

Observability in Multitenancy 111

Integration with Modern DevOps and SecOps Toolchains 111

Lack of Standardization 112

Advanced Analytics and Predictive Insights 112

Comprehensive Monitoring and Security Architecture for Containerized Workloads 112

Comprehensive Visibility Across Layers 115

Container-Level Monitoring: Runtime Security and Observability 116

Kubernetes Control Plane Monitoring: Orchestration Platform Security 118

Infrastructure Monitoring: Host and Cloud Environment Security 119

Threat Intelligence Integration: Enriched Detection and Proactive Defense 120

Automated Detection and Response 120

Application Performance Monitoring and Security 121

Compliance and Regulatory Adherence 122

Proactive Threat Detection: MITRE ATT&CK Operationalization 123

Enhancing Modern Capabilities with Advanced Techniques 123

Toward a Secure and Resilient Cloud-Native Future 127

Summary 127

Chapter 7 Kubernetes Orchestration Security 129

Cloud-Specific Kubernetes Architecture Security 130

Control Plane Security 130

Worker Node Security 131

Shared Security Responsibilities 133

Securing the Kubernetes API in Azure, GCP, and AWS 134

Securing AKS API 134

Securing GKE API 135

Securing EKS API 135

Best Practices for Securing the Kubernetes API 136

Audit Logging and Policy Engine in Cloud Platform 137

Implementation Strategies 137

Policy Engine 138

Integration and Operational Considerations 138

AKS Policy Implementation 139

GKE Policy Controls 139

EKS Policy Framework 140

Cross-Platform Policy Considerations 140

Advanced Policy Patterns 141

Audit Logging 141

AKS Audit Logging 142

GKE Audit Logging 142

EKS Audit Logging 143

Cross-Platform Audit Logging Strategies 143

Advanced Audit Logging Patterns 144

Security Policies and Resource Management for Cloud-Based Kubernetes 144

Network Policies and Admission Controllers in Cloud 145

Azure Policy Implementation 145

Google Kubernetes Engine Policy Control 146

AWS Network Policy Implementation 147

Network Policy Implementation 147

Advanced Implementation Strategies 148

Summary 148

Chapter 8 Zero Trust Model for Cloud Container Security 149

Zero Trust Concept and Core Principles 150

Core Principles of Zero Trust Architecture 151

Implementing Zero Trust in Cloud-Based Containers 153

IAM in Zero Trust 153

Network Segmentation and Micro-Segmentation in Cloud Containers 154

Network Segmentation 154

Micro-Segmentation 155

Continuous Monitoring and Risk-Based Access Decisions in Cloud 155

End-to-End Encryption and Data Security in Cloud Containers 156

Zero Trust in Kubernetes Security 157

Enforcing Kubernetes Security Policies with Zero Trust Principles 157

Zero Trust for Service Meshes (Istio, Linkerd) in Cloud-Based Kubernetes 158

Secure Access to Cloud-Based Kubernetes Control Planes 160

The Importance of Secure Access 160

Securing with Private Azure Kubernetes Service Cluster 161

Implementing Zero Trust for Multicloud Container Environments 163

Zero Trust Framework in Multicloud 163

Case Study: Applying Zero Trust in Cloud Container Workloads for a Banking Customer 165

Summary 166

Chapter 9 DevSecOps in Cloud-Based Container Platform 169

DevOps to DevSecOps in Azure, GCP, and AWS 170

Integrating Security into Cloud CI/CD Pipelines 172

SAST and Dependency Analysis in Cloud Environments 175

Infrastructure as Code Security for Cloud 177

Secrets Management in Cloud-Native DevSecOps 178

Continuous Monitoring and Alerts in Cloud-Based DevSecOps 180

...
Details
Erscheinungsjahr: 2025
Fachbereich: Nachrichtentechnik
Genre: Importe, Technik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: Einband - flex.(Paperback)
ISBN-13: 9781394333738
ISBN-10: 1394333730
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Manavi, Sina
Kudrati, Abbas
Zali, Muhammad Aizuddin
Hersteller: Wiley
Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de
Maße: 231 x 185 x 20 mm
Von/Mit: Sina Manavi (u. a.)
Erscheinungsdatum: 12.08.2025
Gewicht: 0,522 kg
Artikel-ID: 133570000

Ähnliche Produkte