Security Automation with Ansible 2 / Akula, Madhu.

Automate security-related tasks in a structured, modular fashion using the best open source automation tool available About This Book Leverage the agentless, push-based power of Ansible 2 to automate security tasks Learn to write playbooks that apply security to any part of your system This recipe-b...

Full description

Saved in:
Bibliographic Details
Main Authors: Akula, Madhu (Author), Mahajan, Akash (Author)
Format: eBook
Language:English
Published: Packt Publishing, 2017.
Edition:1st edition.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a22000007i 4500
001 on1019734000
003 OCoLC
005 20240909213021.0
006 m o d
007 cr |n|||||||||
008 180116s2017 xx o 000 0 eng
040 |a UIU  |b eng  |e pn  |c UIU  |d OCLCO  |d EBLCP  |d MERUC  |d OCLCO  |d NLE  |d OCLCF  |d IDB  |d COO  |d OCLCA  |d UOK  |d OCLCQ  |d WYU  |d LVT  |d C6I  |d UKAHL  |d VT2  |d OCLCQ  |d UKMGB  |d OCLCQ  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCO  |d OCLCL  |d SXB  |d OCLCQ  |d UEJ 
015 |a GBB7O7530  |2 bnb 
016 7 |a 018653352  |2 Uk 
019 |a 1017002128 
020 |a 9781788394512 
020 |a 1788394518 
020 |a 1788398726 
020 |a 9781788398725 
020 |z 9781788394512 
020 |z 9781788398725 
035 |a (OCoLC)1019734000  |z (OCoLC)1017002128 
037 |a 9781788398725  |b Packt Publishing Pvt. Ltd 
050 4 |a TK5105.59  |b .A385 2017eb 
049 |a HCDD 
100 1 |a Akula, Madhu,  |e author. 
245 1 0 |a Security Automation with Ansible 2 /  |c Akula, Madhu. 
250 |a 1st edition. 
264 1 |b Packt Publishing,  |c 2017. 
300 |a 1 online resource (364 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Automate security-related tasks in a structured, modular fashion using the best open source automation tool available About This Book Leverage the agentless, push-based power of Ansible 2 to automate security tasks Learn to write playbooks that apply security to any part of your system This recipe-based guide will teach you to use Ansible 2 for various use cases such as fraud detection, network security, governance, and more Who This Book Is For If you are a system administrator or a DevOps engineer with responsibility for finding loop holes in your system or application, then this book is for you. It's also useful for security consultants looking to automate their infrastructure's security model. What You Will Learn Use Ansible playbooks, roles, modules, and templating to build generic, testable playbooks Manage Linux and Windows hosts remotely in a repeatable and predictable manner See how to perform security patch management, and security hardening with scheduling and automation Set up AWS Lambda for a serverless automated defense Run continuous security scans against your hosts and automatically fix and harden the gaps Extend Ansible to write your custom modules and use them as part of your already existing security automation programs Perform automation security audit checks for applications using Ansible Manage secrets in Ansible using Ansible Vault In Detail Security automation is one of the most interesting skills to have nowadays. Ansible allows you to write automation procedures once and use them across your entire infrastructure. This book will teach you the best way to use Ansible for seemingly complex tasks by using the various building blocks available and creating solutions that are easy to teach others, store for later, perform version control on, and repeat. We'll start by covering various popular modules and writing simple playbooks to showcase those modules. You'll see how this can be applied over a variety of platforms and operating systems, whether they are Windows/Linux bare metal servers or containers on a cloud platform. Once the bare bones automation is in place, you'll learn how to leverage tools such as Ansible Tower or even Jenkins to create scheduled repeatable processes around security patching, security hardening, compliance reports, monitoring of systems, and so on. Moving on, you'll delve into useful security automation techniques and approaches, and learn how to extend Ansible for enhanced security. While on t ... 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security  |x Management. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data protection. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
700 1 |a Mahajan, Akash,  |e author. 
758 |i has work:  |a Security Automation with Ansible 2 (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCXY3c8wy8KvXtmc7Gbf6rq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Akula, Madhu.  |t Security Automation with Ansible 2.  |d Birmingham : Packt Publishing, ©2017 
856 4 0 |u https://ebookcentral.proquest.com/lib/holycrosscollege-ebooks/detail.action?docID=5188229  |y Click for online access 
903 |a EBC-AC 
994 |a 92  |b HCD