December 2020
Intermediate to advanced
285 pages
6h 10m
English
In Part 2, the focus is clearly on identifying the vulnerabilities from a red team perspective (aka black hat) and how the blue team (white hat) could defend from the attack. The topics for cloud security are in alignment but, the “red team” goal is to help train the blue teams defense on specific cloud targets. During the chapters in Part 2, the reader is guided through many attack matrices from https://attack.mitre.org/ and C2 Matrix examples of attackers and their attack techniques.
Guidance on using the Azure cloud-native services like Azure Security Center, Azure Sentinel, and the value of Azure policies is included. Additional sidebars are used to identify how your cloud ...