Skip to Content
Securing DevOps
book

Securing DevOps

by Julien Vehent
August 2018
Intermediate to advanced
384 pages
12h 18m
English
Manning Publications
Content preview from Securing DevOps

9 Detecting intrusions

This chapter covers

  • Examining the phases of an intrusion as it progresses through the infrastructure
  • Detecting intrusions using indicators of compromise
  • Using Linux audit logs to detect intrusions
  • Inspecting the filesystems, memory, and network of endpoints remotely
  • Filtering outbound network traffic using intrusion-detection systems
  • Understanding the roles of developers and operators in detecting intrusions

July 2015. A hacker known by the pseudonym “Phineas Fisher” posts a short but terrifying message on Twitter:

gamma and HT down, a few more to go :)

The message quickly propagates across the information-security community. Gamma International and Hacking Team (HT) are two well-known security firms that sell offensive ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Hands-On Security in DevOps

Hands-On Security in DevOps

Tony Hsiang-Chih Hsu
Kubernetes Security

Kubernetes Security

Liz Rice, Michael Hausenblas

Publisher Resources

ISBN: 9781617294136Supplemental ContentPublisher SupportOtherPublisher WebsiteErrata PagePurchase Link