Security for Cloud Native Applications
ISBN: 978-93-555-1890-3
Format: 19.1x23.5cm
Liczba stron: 252
Oprawa: Miękka
Wydanie: 2024 r.
Język: angielski
Dostępność: dostępny
<p><strong style="color: rgba(34, 34, 34, 1)">Your practical handbook for securing cloud-native applications</strong></p><p><br></p><p><strong style="color: rgba(0, 0, 0, 1); background-color: rgba(0, 0, 0, 0)"><span></span>DESCRIPTION </strong></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">Security for cloud-native applications is an overview of cloud-native application's characteristics from a security point of view, filled with best practices for securing services based on AWS, Azure, and GCP infrastructure.</span></p><p><br></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">This book is a practical guide for securing cloud-native applications throughout their lifecycle. It establishes foundational knowledge of cloud services and cloud-native characteristics. It focuses on securing design approaches like APIs, microservices, and event-driven architectures. Specific technologies like containers, Kubernetes, and serverless functions are covered with security best practices. The book emphasizes integrating security throughout development using CI/CD pipelines and IaC tools. It explores policy as code for enforcing security policies and immutable infrastructure for enhanced security posture. Key management and threat detection strategies are also covered. Finally, the book offers a practical example and resources for further learning.</span></p><p><br></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">By the end of the book, the reader will be able to design and secure modern applications using the public cloud scale, managed services, automation, and built-in security controls.</span></p><p><br></p><p><strong style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">WHAT YOU WILL LEARN</strong></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">● </span><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">How to secure modern design architectures from APIs, event-driven architectures, and microservices.</span></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">● </span><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">How to secure applications using containers and the Kubernetes platform.</span></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">● </span><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">How to secure applications using serverless/function-as-a-service.</span></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">● </span><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">How to implement key and secrets management as part of cloud-native applications.</span></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">● </span><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">How to implement the 12-factor application methodology and immutable infrastructure in cloud-native applications.</span></p><p><br></p><p><strong style="background-color: rgba(0, 0, 0, 0); color: rgba(0, 0, 0, 1)">WHO THIS BOOK IS FOR</strong></p><p><span style="background-color: rgba(0, 0, 0, 0); color: rgba(34, 34, 34, 1)">This book is for security professionals, software development teams, DevOps and cloud architects, and all those who are designing, maintaining, and securing cloud-native applications.</span></p><p><br></p><p><br></p><p><br></p><p><br></p>