Cloud Hardening
13 chapters on cloud security — from AWS and Azure to Kubernetes and secrets management.
Cloud Providers
- Preventing Cloud Reconnaissance — Minimizing the attack surface in the cloud
- AWS Hardening — Securing IAM, S3, VPC, and CloudTrail
- Azure & Entra ID Hardening — Azure AD, Conditional Access, and resource security
- GCP Hardening — Configuring IAM, VPC, and Cloud Audit Logs
- Container Hardening — Docker images, runtime security, and registries
Modern Defense
- CI/CD Pipeline Hardening — Securing build pipelines against supply chain attacks
- Serverless Hardening — Securing Lambda, Functions, and Cloud Run
- Stopping Cloud Lateral Movement — Blocking cross-account and cross-service pivoting
- Preventing Cloud Persistence — Detecting backdoor accounts and roles
- Cloud Detection & Logging — CloudTrail, Azure Monitor, and centralized logging
- Kubernetes Hardening — RBAC, network policies, and pod security
- Infrastructure as Code Security — Terraform, CloudFormation, and policy-as-code
- Secrets Management — Vault, KMS, and securely handling credentials