Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Mastering Cloud Security Posture Management (CSPM)
  • Table Of Contents Toc
  • Feedback & Rating feedback
Mastering Cloud Security Posture Management (CSPM)

Mastering Cloud Security Posture Management (CSPM)

By : Qamar Nomani
5 (5)
close
close
Mastering Cloud Security Posture Management (CSPM)

Mastering Cloud Security Posture Management (CSPM)

5 (5)
By: Qamar Nomani

Overview of this book

This book will help you secure your cloud infrastructure confidently with cloud security posture management (CSPM) through expert guidance that’ll enable you to implement CSPM effectively, ensuring an optimal security posture across multi-cloud infrastructures. The book begins by unraveling the fundamentals of cloud security, debunking myths about the shared responsibility model, and introducing key concepts such as defense-in-depth, the Zero Trust model, and compliance. Next, you’ll explore CSPM's core components, tools, selection criteria, deployment strategies, and environment settings, which will be followed by chapters on onboarding cloud accounts, dashboard customization, cloud assets inventory, configuration risks, and cyber threat hunting. As you progress, you’ll get to grips with operational practices, vulnerability and patch management, compliance benchmarks, and security alerts. You’ll also gain insights into cloud workload protection platforms (CWPPs). The concluding chapters focus on Infrastructure as Code (IaC) scanning, DevSecOps, and workflow automation, providing a thorough understanding of securing multi-cloud environments. By the end of this book, you’ll have honed the skills to make informed decisions and contribute effectively at every level, from strategic planning to day-to-day operations.
Table of Contents (26 chapters)
close
close
1
Part 1:CSPM Fundamentals
6
Part 2: CSPM Deployment Aspects
11
Part 3: Security Posture Enhancement
19
Part 4: Advanced Topics and Future Trends

Lateral movement misconfigurations

Lateral movement refers to the ability of an attacker to move horizontally from one compromised resource or system to another within the same environment. Misconfigurations that allow for lateral movement can lead to the rapid spread of attacks and greater compromise of resources across your cloud environment. Here are some common lateral movement-related misconfigurations to be aware of:

  • Weak network segmentation: Not properly segmenting network resources and failing to establish appropriate network controls.

    Risk: Weak network segmentation allows attackers who gain access to one resource to easily move laterally and access other resources.

  • Excessive trust between resources: Overly permissive access policies or trust relationships between resources, allowing unauthorized lateral movement.

    Risk: Excessive trust enables attackers to leverage compromised credentials to access additional resources without detection.

  • Shared privileges across...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY