Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering Cloud Security Posture Management (CSPM)

You're reading from   Mastering Cloud Security Posture Management (CSPM) Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques

Arrow left icon
Product type Paperback
Published in Jan 2024
Publisher Packt
ISBN-13 9781837638406
Length 472 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Qamar Nomani Qamar Nomani
Author Profile Icon Qamar Nomani
Qamar Nomani
Arrow right icon
View More author details
Toc

Table of Contents (26) Chapters Close

Preface 1. Part 1:CSPM Fundamentals
2. Chapter 1: Cloud Security Fundamentals FREE CHAPTER 3. Chapter 2: Understanding CSPM and the Threat Landscape 4. Chapter 3: CSPM Tools and Features 5. Chapter 4: CSPM Tool Selection 6. Part 2: CSPM Deployment Aspects
7. Chapter 5: Deploying the CSPM Tool 8. Chapter 6: Onboarding Cloud Accounts 9. Chapter 7: Onboarding Containers 10. Chapter 8: Exploring Environment Settings 11. Part 3: Security Posture Enhancement
12. Chapter 9: Exploring Cloud Asset Inventory 13. Chapter 10: Reviewing CSPM Dashboards 14. Chapter 11: Major Configuration Risks 15. Chapter 12: Investigating Threats with Query Explorers and KQL 16. Chapter 13: Vulnerability and Patch Management 17. Chapter 14: Compliance Management and Governance 18. Chapter 15: Security Alerts and Monitoring 19. Part 4: Advanced Topics and Future Trends
20. Chapter 16: Integrating CSPM with IaC 21. Chapter 17: DevSecOps – Workflow Automation 22. Chapter 18: CSPM-Related Technologies 23. Chapter 19: Future Trends and Challenges 24. Index 25. Other Books You May Enjoy

What this book covers

Chapter 1, Cloud Security Fundamentals, Let’s start with the basics! This chapter lays the foundation, ensuring everyone is on the same page when it comes to keeping things safe and sound in the cloud.

Chapter 2, Understanding CSPM and the Threat Landscape. This chapter decodes the language of CSPM and explores the potential threats hiding in the digital shadows.

Chapter 3, CSPM Tools and Features, Meet your digital allies. This chapter helps you explore the tools and features integral to CSPM, arming you with the resources needed for a robust security strategy.

Chapter 4, CSPM Tool Selection, Choose wisely. This chapter guides you through the process of selecting the right CSPM tool for your organization’s unique security needs.

Chapter 5, Deploying the CSPM Tool, Put theory into practice. This chapter covers the practical steps involved in deploying your chosen CSPM tool effectively across your cloud infrastructure.

Chapter 6, Onboarding Cloud Accounts. This chapter explains how you can unify your cloud accounts seamlessly with a CSPM tool. Master the onboarding process to ensure comprehensive protection across your digital landscape.

Chapter 7, Onboarding Containers, Safeguard your digital treasures. This chapter covers secure methods for onboarding and protecting valuable containers in your cloud environment.

Chapter 8, Exploring Environment Settings. This chapter empowers you to manage your cloud environment effectively.

Chapter 9, Exploring Cloud Asset Inventory, Know your assets inside out. This chapter dives into managing and tracking your cloud assets with precision and efficiency.

Chapter 10, Reviewing CSPM Dashboards, Command your security hub. This chapter explains how to navigate and interpret CSPM dashboards, providing valuable insights into your security status.

Chapter 11, Major Configuration Risks, Stay ahead of potential risks. This chapter covers identifying and mitigating major configuration risks, ensuring a secure and resilient cloud environment.

Chapter 12, Investigating Threats with Query Explorer and KQL, Become a digital detective. This chapter shows you how to uncover hidden risks and investigate their potential impact through advanced attack path analysis.

Chapter 13, Vulnerability and Patch Management, Protect your digital fortress. This chapter explores the vulnerabilities that emerge within cloud environments, emphasizing the dynamic nature of the cloud and how it necessitates a proactive approach to security. We will also explore the role of Cyber Threat Intelligence (CTI) in enhancing vulnerability management.

Chapter 14, Compliance Management and Governance. This chapter guides you through compliance management and governance for a secure cloud.

Chapter 15, Security Alerts and Monitoring, Be the guardian of your digital realm. This chapter covers the art of real-time alerts and proactive monitoring to stay one step ahead of potential security threats.

Chapter 16, Integrating CSPM with IaC, Merge security seamlessly with code. This chapter covers the integration process, aligning security practices with modern development workflows.

Chapter 17, DevSecOps – Workflow Automation, Join the revolution. This chapter explores how DevSecOps principles can be employed for seamless security integration in development workflows.

Chapter 18, CSPM-Related Technologies, Explore the tech landscape surrounding CSPM. This chapter provides insights into related technologies that complement and enhance cloud security posture management.

Chapter 19, Future Trends and Challenges, Peek into the future of cloud security. This chapter covers emerging trends and will help you to anticipate challenges, preparing yourself for the evolving digital landscape.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime