Further reading
The following are resources that can be used to gain more knowledge about the topics covered in this chapter:
- SANS, Incident handler's handbook: https://www.sans.org/reading-room/whitepapers/incident/incident-handlers-handbook-33901
- Security Boulevard, Incident response in the cloud: https://securityboulevard.com/2018/04/incident-response-in-the-cloud-4-ways-to-improve-your-investigation-and-containment-capabilities/
- Trend Micro, Updating incident response for the cloud: https://blog.trendmicro.com/pdating-incident-response-for-the-cloud/
- Okta, Incident Response in the Cloud: https://www.okta.com/blog/2018/04/incident-response-in-the-cloud/
- NSA Cloud Vulnerabilities: https://media.defense.gov/2020/Jan/22/2002237484/-1/-1/0/CSI-MITIGATING-CLOUD-VULNERABILITIES_20200121.PDF
- ExtraHop, Insecure APIs cause solutions: https://www.extrahop.com/company/blog/2020/insecure-apis-cloud-computing-cause-solutions/
- Rapid7, Security...