Difference between revisions of "Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
(Automatic literature update)
Line 1: Line 1:
[[File:Creating Security Automation with Ansible 2.jpg|500px]]
{{Literature|device_name=Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis|image_link=https://stuff.elvis.science/uploads/accessories/accessory-image-W4Ds3EcEPm.jpeg|type=Book|author=Madhu Akula, Akash Mahajan|language=English|isbn=978-1788394512|publisher=Packt Publishing (2017)|pages=364|references=https://www.packtpub.com/eu/virtualization-and-cloud/security-automation-ansible-2|description="Security automation is one of the most interesting skills to have nowadays. Ansible allows you to write automation procedures once and use them across your entire infrastructure. This book will teach you the best way to use Ansible for seemingly complex tasks by using the various building blocks available and creating solutions that are easy to teach others, store for later, perform version control on, and repeat.
=== Information ===
{| class="wikitable"
|-
| Type
| Book
|-
| Authors
| Madhu Akula, Akash Mahajan
|-
| Language
| English
|-
| Publisher
| Packt Publishing (2017)
|-
| ISBN
| 978-1788394512
|-
| Pages
| 364
|-
|}
 
=== Book Description ===
 
"Security automation is one of the most interesting skills to have nowadays. Ansible allows you to write automation procedures once and use them across your entire infrastructure. This book will teach you the best way to use Ansible for seemingly complex tasks by using the various building blocks available and creating solutions that are easy to teach others, store for later, perform version control on, and repeat.


We’ll start by covering various popular modules and writing simple playbooks to showcase those modules. You’ll see how this can be applied over a variety of platforms and operating systems, whether they are Windows/Linux bare metal servers or containers on a cloud platform. Once the bare bones automation is in place, you’ll learn how to leverage tools such as Ansible Tower or even Jenkins to create scheduled repeatable processes around security patching, security hardening, compliance reports, monitoring of systems, and so on.
We’ll start by covering various popular modules and writing simple playbooks to showcase those modules. You’ll see how this can be applied over a variety of platforms and operating systems, whether they are Windows/Linux bare metal servers or containers on a cloud platform. Once the bare bones automation is in place, you’ll learn how to leverage tools such as Ansible Tower or even Jenkins to create scheduled repeatable processes around security patching, security hardening, compliance reports, monitoring of systems, and so on.


Moving on, you’ll delve into useful security automation techniques and approaches, and learn how to extend Ansible for enhanced security. While on the way, we will tackle topics like how to manage secrets, how to manage all the playbooks that we will create and how to enable collaboration using Ansible Galaxy. In the final stretch, we’ll tackle how to extend the modules of Ansible for our use, and do all the previous tasks in a programmatic manner to get even more powerful automation frameworks and rigs."<ref name="packtpub.com"> https://www.packtpub.com/eu/virtualization-and-cloud/security-automation-ansible-2 </ref>
Moving on, you’ll delve into useful security automation techniques and approaches, and learn how to extend Ansible for enhanced security. While on the way, we will tackle topics like how to manage secrets, how to manage all the playbooks that we will create and how to enable collaboration using Ansible Galaxy. In the final stretch, we’ll tackle how to extend the modules of Ansible for our use, and do all the previous tasks in a programmatic manner to get even more powerful automation frameworks and rigs.&quot;}}
== References ==
<references />
 
[[Category:Literature]]

Revision as of 23:16, 8 April 2021

accessory-image-W4Ds3EcEPm.jpeg

Information
Type Book
Author Madhu Akula, Akash Mahajan
Language English
Publisher Packt Publishing (2017)
ISBN 978-1788394512
Pages 364

Book Description

"Security automation is one of the most interesting skills to have nowadays. Ansible allows you to write automation procedures once and use them across your entire infrastructure. This book will teach you the best way to use Ansible for seemingly complex tasks by using the various building blocks available and creating solutions that are easy to teach others, store for later, perform version control on, and repeat.

We’ll start by covering various popular modules and writing simple playbooks to showcase those modules. You’ll see how this can be applied over a variety of platforms and operating systems, whether they are Windows/Linux bare metal servers or containers on a cloud platform. Once the bare bones automation is in place, you’ll learn how to leverage tools such as Ansible Tower or even Jenkins to create scheduled repeatable processes around security patching, security hardening, compliance reports, monitoring of systems, and so on.

Moving on, you’ll delve into useful security automation techniques and approaches, and learn how to extend Ansible for enhanced security. While on the way, we will tackle topics like how to manage secrets, how to manage all the playbooks that we will create and how to enable collaboration using Ansible Galaxy. In the final stretch, we’ll tackle how to extend the modules of Ansible for our use, and do all the previous tasks in a programmatic manner to get even more powerful automation frameworks and rigs."

References

https://www.packtpub.com/eu/virtualization-and-cloud/security-automation-ansible-2