Reader small image

You're reading from  Enterprise Cloud Security and Governance

Product typeBook
Published inDec 2017
PublisherPackt
ISBN-139781788299558
Edition1st Edition
Tools
Right arrow
Author (1)
Zeal Vora
Zeal Vora
author image
Zeal Vora

Zeal Vora works as a DevSecOps Engineer primarily in the area of Defensive Security. He spends his days protecting and implementing security controls to help mitigate attacks both on the Cloud and servers. He is actively involved in security consultation, helping various startups which have been breached to overcome the breach and start again with a secure infrastructure.
Read more about Zeal Vora

Right arrow

Cloud readiness

This section deals with an overview of pointers, which are necessary to take care of when you have decided to go ahead with a cloud service provider and are planning to launch your infrastructure:

Sr. no.

Point

Description

1


Setup MFA and avoid usage of the ROOT account

Since the ROOT account has FULL permission over our environment and we cannot limit permissions for the ROOT account avoid the usage of the ROOT account and switch to the IAM account.

2

Implement cloud hardening guidelines

AWS has great hardening guidelines developed by the center for internet security. Similarly, there are security best practices for other cloud environments such as Azure and Google Cloud, which one can follow depending on their stack. Whatever you do, have a preference for automation. Terraform is a very good choice.

3

Be aware of how your environment...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Enterprise Cloud Security and Governance
Published in: Dec 2017Publisher: PacktISBN-13: 9781788299558

Author (1)

author image
Zeal Vora

Zeal Vora works as a DevSecOps Engineer primarily in the area of Defensive Security. He spends his days protecting and implementing security controls to help mitigate attacks both on the Cloud and servers. He is actively involved in security consultation, helping various startups which have been breached to overcome the breach and start again with a secure infrastructure.
Read more about Zeal Vora