O'Reilly logo

Automating Security in the Cloud by Ted Steffan, Tim Sandage

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5 – Implementing foundation level automation  

The “Awaken of Security Automation” in the cloud will fundamentally changed what it means to be secure and compliant. The sharp increase in data losses over the last five years has unearthed the shortcomings of annual or semi-annual audits which only look at a sub-set of control implementation or a sampling as organizational IT assets are too large to audit all services each time there is an audit review. Moving and building in cloud, entails shifting the way’s you deploy systems, services and solutions through the use of automation. We can’t say it enough everything in the cloud is an asset and potentially everything in the cloud is an endpoint or potentially internet accessible based on the type of architecture your organization deploys. Or worse yet based on the lack of architecture your organization deploys you could find out every asset in your cloud journey is un-secure and on the internet. Image

Automation and API communication are required in your journey to the cloud; since solutions are built quickly, mistakes will and can stack up quickly. Meaning if your organization does not develop a deployment strategy which includes automation for deployments, operations, remediation and security/audit reporting you cloud deployment may be more difficult than necessary.  The end state with the cloud true end to end automation is more ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required