Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036

Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis

1 Anmeldelser

5

Sprog
Engelsk
Format
Kategori

Fakta

Automate security-related tasks in a structured, modular fashion using the best open source automation tool available

About This Book • Leverage the agentless, push-based power of Ansible 2 to automate security tasks

• Learn to write playbooks that apply security to any part of your system

• This recipe-based guide will teach you to use Ansible 2 for various use cases such as fraud detection, network security, governance, and more

Who This Book Is For

If you are a system administrator or a DevOps engineer with responsibility for finding loop holes in your system or application, then this book is for you. It's also useful for security consultants looking to automate their infrastructure's security model.

What You Will Learn • Use Ansible playbooks, roles, modules, and templating to build generic, testable playbooks

• Manage Linux and Windows hosts remotely in a repeatable and predictable manner

• See how to perform security patch management, and security hardening with scheduling and automation

• Set up AWS Lambda for a serverless automated defense

• Run continuous security scans against your hosts and automatically fix and harden the gaps

• Extend Ansible to write your custom modules and use them as part of your already existing security automation programs

• Perform automation security audit checks for applications using Ansible

• Manage secrets in Ansible using Ansible Vault

In Detail

Security automation is one of the most interesting skills to have nowadays. Ansible allows you to write automation procedures once and use them across your entire infrastructure. This book will teach you the best way to use Ansible for seemingly complex tasks by using the various building blocks available and creating solutions that are easy to teach others, store for later, perform version control on, and repeat.

We'll start by covering various popular modules and writing simple playbooks to showcase those modules. You'll see how this can be applied over a variety of platforms and operating systems, whether they are Windows/Linux bare metal servers or containers on a cloud platform. Once the bare bones automation is in place, you'll learn how to leverage tools such as Ansible Tower or even Jenkins to create scheduled repeatable processes around security patching, security hardening, compliance reports, monitoring of systems, and so on.

Moving on, you'll delve into useful security automation techniques and approaches, and learn how to extend Ansible for enhanced security. While on the way, we will tackle topics like how to manage secrets, how to manage all the playbooks that we will create and how to enable collaboration using Ansible Galaxy. In the final stretch, we'll tackle how to extend the modules of Ansible for our use, and do all the previous tasks in a programmatic manner to get even more powerful automation frameworks and rigs.

Style and approach

This comprehensive guide will teach you to manage Linux and Windows hosts remotely in a repeatable and predictable manner. The book takes an in-depth approach and helps you understand how to set up complicated stacks of software with codified and easy-to-share best practices.

© 2017 Packt Publishing (E-bog): 9781788398725

Release date

E-bog: 13. december 2017

Tags

    Andre kan også lide...

    1. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    2. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    3. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    4. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
    5. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    6. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
    7. Cloud Security For Dummies Ted Coombs
    8. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    9. Fundamentals of Software Architecture: An Engineering Approach Neal Ford
    10. Security Chaos Engineering: Sustaining Resilience in Software and Systems Aaron Rinehart
    11. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    12. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    13. 97 Principles for Software Architects: Axioms for software architecture and development written by industry practitioners Multiple Authors
    14. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    15. Infrastructure Attack Strategies for Ethical Hacking Himanshu Sharma
    16. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
    17. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
    18. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    19. Social Engineering: The Art of Human Hacking Christopher Hadnagy
    20. Ultimate Penetration Testing with Nmap Travis DeForge
    21. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
    22. Coding for Beginners Using Python: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON MARK MATTHES AND ERIC LUTZ
    23. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
    24. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    25. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
    26. The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution Walter Isaacson
    27. The Software Developer's Career Handbook: A Guide to Navigating the Unpredictable Michael Lopp
    28. Ultimate Cyberwarfare for Evasive Cyber Tactics Chang Tan
    29. Cloud Security Handbook for Architects Ashish Mishra

    Vælg dit abonnement

    • Over 600.000 titler

    • Download og nyd titler offline

    • Eksklusive titler + Mofibo Originals

    • Børnevenligt miljø (Kids Mode)

    • Det er nemt at opsige når som helst

    Flex

    For dig som vil prøve Mofibo.

    89 kr. /måned
    • 1 konto

    • 20 timer/måned

    • Gem op til 100 ubrugte timer

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Prøv gratis
    Den mest populære

    Premium

    For dig som lytter og læser ofte.

    129 kr. /måned
    • 1 konto

    • 100 timer/måned

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Unlimited

    For dig som lytter og læser ubegrænset.

    149 kr. /måned
    • 1 konto

    • Ubegrænset adgang

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Family

    For dig som ønsker at dele historier med familien.

    Fra 179 kr. /måned
    • 2-6 konti

    • 100 timer/måned pr. konto

    • Fri lytning til podcasts

    • Kun 39 kr. pr. ekstra konto

    • Ingen binding

    2 konti

    179 kr. /måned
    Prøv gratis