Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
Cloud Security Handbook

You're reading from   Cloud Security Handbook Effectively secure cloud environments using AWS, Azure, and GCP

Arrow left icon
Product type Paperback
Published in Apr 2025
Publisher Packt
ISBN-13 9781836200017
Length 482 pages
Edition 2nd Edition
Arrow right icon
Author (1):
Arrow left icon
Eyal Estrin Eyal Estrin
Author Profile Icon Eyal Estrin
Eyal Estrin
Arrow right icon
View More author details
Toc

Table of Contents (24) Chapters Close

Preface 1. Part 1:Securing Infrastructure Cloud Services FREE CHAPTER
2. Chapter 1: Introduction to Cloud Security 3. Chapter 2: Securing Compute Services – Virtual Machines 4. Chapter 3: Securing Compute Services – Containers and Kubernetes 5. Chapter 4: Securing Compute Services – Serverless and FaaS 6. Chapter 5: Securing Storage Services 7. Chapter 6: Securing Networking Services – Part 1 8. Chapter 7: Securing Networking Services – Part 2 9. Chapter 8: Securing Generative AI Services 10. Part 2: Deep Dive into IAM, Auditing, and Encryption
11. Chapter 9: Effective Strategies for Implementing IAM Solutions 12. Chapter 10: Auditing and Threat Management in Cloud Environments 13. Chapter 11: Applying Encryption in Cloud Services 14. Part 3: Threat and Vendor Management
15. Chapter 12: Understanding Common Security Threats to Cloud Services 16. Chapter 13: Engaging with Cloud Providers 17. Part 4: Advanced Use of Cloud Services
18. Chapter 14: Managing Hybrid Clouds 19. Chapter 15: Managing Multi-Cloud Environments 20. Chapter 16: Implementing DevSecOps 21. Chapter 17: Security in Large-Scale Environments 22. Index 23. Other Books You May Enjoy

Best practices for conducting patch management

Patch management is a crucial part of every instance of ongoing maintenance. To deploy security patches for either Windows- or Linux-based instances in a standard manner, it is recommended to use the following method:

  1. Configure the patch baseline.
  2. Use tagging (that is, labeling) for your VMs to allow patch deployment groups per tag (for example, prod versus dev environments).
  3. Scan your VMs for deviation from the patch baseline at a scheduled interval.
  4. Install missing security patches on your VMs.
  5. For stateless VMs (where no user session data is stored inside the VM), replace an existing VM with a new instance, created from an up-to-date operating system image (note: the process is known as immutable infrastructure).
  6. Review patch deployment reports.

Now, let us see the application on each cloud platform.

Amazon EC2

Patch management in the context of Amazon EC2 refers to the action of deploying security...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at ₹800/month. Cancel anytime
Modal Close icon
Modal Close icon