Security for Cloud Native Applications : The practical guide for securing modern applications using AWS, Azure, and GCP

Enregistré dans:
Détails bibliographiques
Auteur principal: Estrin, Eyal. (Auteur)
Support: E-Book
Langue: Anglais
Publié: New Delhi : BPB Publications.
Autres localisations: Voir dans le Sudoc
Résumé: Your practical handbook for securing cloud-native applications. Key Features : - An overview of security in cloud-native applications, such as modern architectures, containers, CI/CD pipeline, and so on. - Using automation, such as infrastructure as code and policy as code, to achieve security at scale. - Implementing security, from encryption and secrets management to threat management. Description. Security for cloud-native applications is an overview of cloud-native application's characteristics from a security point of view, filled with best practices for securing services based on AWS, Azure, and GCP infrastructure. This book is a practical guide for securing cloud-native applications throughout their lifecycle. It establishes foundational knowledge of cloud services and cloud-native characteristics. It focuses on securing design approaches like APIs, microservices, and event-driven architectures. Specific technologies like containers, Kubernetes, and serverless functions are covered with security best practices. The book emphasizes integrating security throughout development using CI/CD pipelines and IaC tools. It explores policy as code for enforcing security policies and immutable infrastructure for enhanced security posture. Key management and threat detection strategies are also covered. Finally, the book offers a practical example and resources for further learning. By the end of the book, the reader will be able to design and secure modern applications using the public cloud scale, managed services, automation, and built-in security controls. What you will learn : - How to secure modern design architectures from APIs, event-driven architectures, and microservices. - How to secure applications using containers and the Kubernetes platform. - How to secure applications using serverless/function-as-a-service. - How to implement key and secrets management as part of cloud-native applications. - How to implement the 12-factor application methodology and immutable infrastructure in cloud-native applications. Who this book is for. This book is for security professionals, software development teams, DevOps and cloud architects, and all those who are designing, maintaining, and securing cloud-native applications. Table of Contents. 1. Introduction to Cloud Native Applications. 2. Securing Modern Design Architectures. 3. Containers and Kubernetes for Cloud Native Applications. 4. Serverless for Cloud Native Applications. 5. Building Secure CI/CD Pipelines. 6. The 12-Factor Application Methodology. 7. Using Infrastructure as Code. 8. Authorization and Policy as Code. 9. Implementing Immutable Infrastructure. 10. Encryption and Secrets Management. 11. Threat Management in Cloud Native Applications. 12. Summary and Key Takeaways
Accès en ligne: Accès à l'E-book
LEADER 04409nmm a2200469 i 4500
001 ebook-278675352
005 20240606103830.0
007 cu|uuu---uuuuu
008 240606s2024||||ii ||||g|||| ||||||eng d
035 |a (OCoLC)1439290197 
035 |a FRCYB88954060 
035 |a FRCYB26088954060 
035 |a FRCYB19188954060 
035 |a FRCYB27488954060 
035 |a FRCYB24788954060 
035 |a FRCYB24888954060 
035 |a FRCYB29388954060 
035 |a FRCYB084688954060 
035 |a FRCYB085688954060 
035 |a FRCYB087588954060 
035 |a FRCYB56788954060 
035 |a FRCYB63288954060 
035 |a FRCYB097088954060 
035 |a FRCYB087088954060 
040 |a ABES  |b fre  |e AFNOR 
041 0 |a eng  |2 639-2 
100 1 |a Estrin, Eyal.  |4 aut.  |e Auteur 
245 1 0 |a Security for Cloud Native Applications :  |b The practical guide for securing modern applications using AWS, Azure, and GCP   |c Eyal Estrin. 
264 1 |a New Delhi :  |b BPB Publications. 
264 2 |a Paris :  |b Cyberlibris,  |c 2024. 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
337 |b b  |2 isbdmedia 
338 |b ceb  |2 RDAfrCarrier 
500 |a Couverture (https://static2.cyberlibris.com/books_upload/136pix/9789355518903.jpg). 
506 |a L'accès en ligne est réservé aux établissements ou bibliothèques ayant souscrit l'abonnement  |e Cyberlibris 
520 |a Your practical handbook for securing cloud-native applications. Key Features : - An overview of security in cloud-native applications, such as modern architectures, containers, CI/CD pipeline, and so on. - Using automation, such as infrastructure as code and policy as code, to achieve security at scale. - Implementing security, from encryption and secrets management to threat management. Description. Security for cloud-native applications is an overview of cloud-native application's characteristics from a security point of view, filled with best practices for securing services based on AWS, Azure, and GCP infrastructure. This book is a practical guide for securing cloud-native applications throughout their lifecycle. It establishes foundational knowledge of cloud services and cloud-native characteristics. It focuses on securing design approaches like APIs, microservices, and event-driven architectures. Specific technologies like containers, Kubernetes, and serverless functions are covered with security best practices. The book emphasizes integrating security throughout development using CI/CD pipelines and IaC tools. It explores policy as code for enforcing security policies and immutable infrastructure for enhanced security posture. Key management and threat detection strategies are also covered. Finally, the book offers a practical example and resources for further learning. By the end of the book, the reader will be able to design and secure modern applications using the public cloud scale, managed services, automation, and built-in security controls. What you will learn : - How to secure modern design architectures from APIs, event-driven architectures, and microservices. - How to secure applications using containers and the Kubernetes platform. - How to secure applications using serverless/function-as-a-service. - How to implement key and secrets management as part of cloud-native applications. - How to implement the 12-factor application methodology and immutable infrastructure in cloud-native applications. Who this book is for. This book is for security professionals, software development teams, DevOps and cloud architects, and all those who are designing, maintaining, and securing cloud-native applications. Table of Contents. 1. Introduction to Cloud Native Applications. 2. Securing Modern Design Architectures. 3. Containers and Kubernetes for Cloud Native Applications. 4. Serverless for Cloud Native Applications. 5. Building Secure CI/CD Pipelines. 6. The 12-Factor Application Methodology. 7. Using Infrastructure as Code. 8. Authorization and Policy as Code. 9. Implementing Immutable Infrastructure. 10. Encryption and Secrets Management. 11. Threat Management in Cloud Native Applications. 12. Summary and Key Takeaways 
856 |q HTML  |u https://srvext.uco.fr/login?url=https://univ.scholarvox.com/book/88954060  |w Données éditeur  |z Accès à l'E-book 
886 2 |2 unimarc  |a 181  |a i#  |b xxxe## 
993 |a E-Book  
994 |a BNUM 
995 |a 278675352