Pentesting Azure: The Definitive Guide to Testing and Securing Deployments
J**O
Relevant reference for attacking and defending Azure
I read this book because I wanted to expand my pentesting skills to better meet the needs of my customers who use the Azure cloud. And the book delivered.Each chapter follows a clear structure, covering almost everything there is to cover today, although I had hoped to read a bit more about Azure Active Directory. But that's by no means a dealbreaker: it's the nature of the beast to keep evolving, and the book isn't a crystal ball. Yet just devouring this book fundamentally improved my understanding of Azure, because it speaks my language as a test engineer. I'm pretty sure that with this newfound understanding it'll be much easier to tackle any upcoming changes in Azure. Sure, I could fight my way through technet/msdn, but this book is much more coherent and puts everything in context of prevalent real-world security issues. The book will probably remain relevant for quite a while, and I will keep it close for reference.I also really value the little notes for defenders which can be found throughout the book: they'll help me improve my reports with more meaningful suggestions.If you're a dev/ops person, this book might help you better understand how attackers look at your work ;-)
M**M
A great guide for anyone looking at Azure security
Bought this book as a network/security engineering professional looking at expand my knowledge on azure security. This book has something for everyone. Process for the manager, tips for the defender, and detailed outline for the pen tester.Well writen and organized easy to read through or reference.This books is more than just theory. Author walks you though the methods and details.
D**N
Excellent
Excellent
A**E
More of a review of Azure features & resources.
No more, no less than a review of Azure technologies and basic powershell interactions with the tenant resources.I am working on building use cases for threat detection in Azure and I was hopping to understand more about how an attacker might bypass different defenses available in Azure.I got almost nothing out of this book.
ترست بايلوت
منذ شهرين
منذ 3 أسابيع