April 2018
Intermediate to advanced
280 pages
6h 18m
English
"Automating security" has been a buzzphrase in the world of information security since the dawn of Cloud. It refers to a wide range of products which provide security by monitoring logs and bringing intelligence into processing. The Google Cloud APIs provide us with a plethora of options to monitor and take actions programmatically against events. For this recipe, let us suppose that someone has compromised our programmatic access to GCP and has started launching unauthorized instances in our project. We'll need a way to identify such incidents and take defensive action against such events. We'll make some assumptions as follows: