Security Automation with Ansible 2

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Security Automation with Ansible 2 by Akash Mahajan, Madhu Akula, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Akash Mahajan, Madhu Akula ISBN: 9781788398725
Publisher: Packt Publishing Publication: December 13, 2017
Imprint: Packt Publishing Language: English
Author: Akash Mahajan, Madhu Akula
ISBN: 9781788398725
Publisher: Packt Publishing
Publication: December 13, 2017
Imprint: Packt Publishing
Language: English

Automate security-related tasks in a structured, modular fashion using the best open source automation tool available

About This Book

  • Leverage the agentless, push-based power of Ansible 2 to automate security tasks
  • Learn to write playbooks that apply security to any part of your system
  • This recipe-based guide will teach you to use Ansible 2 for various use cases such as fraud detection, network security, governance, and more

Who This Book Is For

If you are a system administrator or a DevOps engineer with responsibility for finding loop holes in your system or application, then this book is for you. It's also useful for security consultants looking to automate their infrastructure's security model.

What You Will Learn

  • Use Ansible playbooks, roles, modules, and templating to build generic, testable playbooks
  • Manage Linux and Windows hosts remotely in a repeatable and predictable manner
  • See how to perform security patch management, and security hardening with scheduling and automation
  • Set up AWS Lambda for a serverless automated defense
  • Run continuous security scans against your hosts and automatically fix and harden the gaps
  • Extend Ansible to write your custom modules and use them as part of your already existing security automation programs
  • Perform automation security audit checks for applications using Ansible
  • Manage secrets in Ansible using Ansible Vault

In Detail

Security automation is one of the most interesting skills to have nowadays. Ansible allows you to write automation procedures once and use them across your entire infrastructure. This book will teach you the best way to use Ansible for seemingly complex tasks by using the various building blocks available and creating solutions that are easy to teach others, store for later, perform version control on, and repeat.

We'll start by covering various popular modules and writing simple playbooks to showcase those modules. You'll see how this can be applied over a variety of platforms and operating systems, whether they are Windows/Linux bare metal servers or containers on a cloud platform. Once the bare bones automation is in place, you'll learn how to leverage tools such as Ansible Tower or even Jenkins to create scheduled repeatable processes around security patching, security hardening, compliance reports, monitoring of systems, and so on.

Moving on, you'll delve into useful security automation techniques and approaches, and learn how to extend Ansible for enhanced security. While on the way, we will tackle topics like how to manage secrets, how to manage all the playbooks that we will create and how to enable collaboration using Ansible Galaxy. In the final stretch, we'll tackle how to extend the modules of Ansible for our use, and do all the previous tasks in a programmatic manner to get even more powerful automation frameworks and rigs.

Style and approach

This comprehensive guide will teach you to manage Linux and Windows hosts remotely in a repeatable and predictable manner. The book takes an in-depth approach and helps you understand how to set up complicated stacks of software with codified and easy-to-share best practices.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Automate security-related tasks in a structured, modular fashion using the best open source automation tool available

About This Book

Who This Book Is For

If you are a system administrator or a DevOps engineer with responsibility for finding loop holes in your system or application, then this book is for you. It's also useful for security consultants looking to automate their infrastructure's security model.

What You Will Learn

In Detail

Security automation is one of the most interesting skills to have nowadays. Ansible allows you to write automation procedures once and use them across your entire infrastructure. This book will teach you the best way to use Ansible for seemingly complex tasks by using the various building blocks available and creating solutions that are easy to teach others, store for later, perform version control on, and repeat.

We'll start by covering various popular modules and writing simple playbooks to showcase those modules. You'll see how this can be applied over a variety of platforms and operating systems, whether they are Windows/Linux bare metal servers or containers on a cloud platform. Once the bare bones automation is in place, you'll learn how to leverage tools such as Ansible Tower or even Jenkins to create scheduled repeatable processes around security patching, security hardening, compliance reports, monitoring of systems, and so on.

Moving on, you'll delve into useful security automation techniques and approaches, and learn how to extend Ansible for enhanced security. While on the way, we will tackle topics like how to manage secrets, how to manage all the playbooks that we will create and how to enable collaboration using Ansible Galaxy. In the final stretch, we'll tackle how to extend the modules of Ansible for our use, and do all the previous tasks in a programmatic manner to get even more powerful automation frameworks and rigs.

Style and approach

This comprehensive guide will teach you to manage Linux and Windows hosts remotely in a repeatable and predictable manner. The book takes an in-depth approach and helps you understand how to set up complicated stacks of software with codified and easy-to-share best practices.

More books from Packt Publishing

Cover of the book Learning Android Application Development by Akash Mahajan, Madhu Akula
Cover of the book Building Enterprise JavaScript Applications by Akash Mahajan, Madhu Akula
Cover of the book Implementing DevOps on AWS by Akash Mahajan, Madhu Akula
Cover of the book Software Architect’s Handbook by Akash Mahajan, Madhu Akula
Cover of the book JavaScript at Scale by Akash Mahajan, Madhu Akula
Cover of the book Understanding Software by Akash Mahajan, Madhu Akula
Cover of the book IBM WebSphere Application Server v7.0 Security by Akash Mahajan, Madhu Akula
Cover of the book Agile IT Security Implementation Methodology by Akash Mahajan, Madhu Akula
Cover of the book Plone 3 Intranets by Akash Mahajan, Madhu Akula
Cover of the book Becoming the Hacker by Akash Mahajan, Madhu Akula
Cover of the book Building Websites with Joomla! v1.0 by Akash Mahajan, Madhu Akula
Cover of the book Building a Recommendation System with R by Akash Mahajan, Madhu Akula
Cover of the book Node.js Essentials by Akash Mahajan, Madhu Akula
Cover of the book Building Cross-Platform Desktop Applications with Electron by Akash Mahajan, Madhu Akula
Cover of the book Express.js Blueprints by Akash Mahajan, Madhu Akula
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy