July 2018
Intermediate to advanced
356 pages
9h 18m
English
The topic of incident response was discussed in the previous chapter. In this chapter, we will introduce some security monitoring techniques. The objective of this chapter is to prepare our security monitoring mechanism to protect and prevent our cloud services from being attacked. To be prepared for this, our security monitoring procedures should include logging, monitoring the framework, threat intelligence, and security scanning for malicious programs. The topics that will be covered in this chapter are as follows:
Read now
Unlock full access