Security for Cloud Native Applications: The practical guide for securing modern applications using AWS, Azure, and GCP (English Edition)

· BPB Publications
电子书
250

关于此电子书

Your practical handbook for securing cloud-native applications


KEY FEATURES  

● An overview of security in cloud-native applications, such as modern architectures, containers, CI/CD pipeline, and so on.

● Using automation, such as infrastructure as code and policy as code, to achieve security at scale.

● Implementing security, from encryption and secrets management to threat management.


DESCRIPTION 

Security for cloud-native applications is an overview of cloud-native application’s characteristics from a security point of view, filled with best practices for securing services based on AWS, Azure, and GCP infrastructure.


This book is a practical guide for securing cloud-native applications throughout their lifecycle. It establishes foundational knowledge of cloud services and cloud-native characteristics. It focuses on securing design approaches like APIs, microservices, and event-driven architectures. Specific technologies like containers, Kubernetes, and serverless functions are covered with security best practices. The book emphasizes integrating security throughout development using CI/CD pipelines and IaC tools. It explores policy as code for enforcing security policies and immutable infrastructure for enhanced security posture. Key management and threat detection strategies are also covered. Finally, the book offers a practical example and resources for further learning.


By the end of the book, the reader will be able to design and secure modern applications using the public cloud scale, managed services, automation, and built-in security controls.


WHAT YOU WILL LEARN

● How to secure modern design architectures from APIs, event-driven architectures, and microservices.

● How to secure applications using containers and the Kubernetes platform.

● How to secure applications using serverless/function-as-a-service.

● How to implement key and secrets management as part of cloud-native applications.

● How to implement the 12-factor application methodology and immutable infrastructure in cloud-native applications.


WHO THIS BOOK IS FOR

This book is for security professionals, software development teams, DevOps and cloud architects, and all those who are designing, maintaining, and securing cloud-native applications.


TABLE OF CONTENTS

1. Introduction to Cloud Native Applications

2. Securing Modern Design Architectures

3. Containers and Kubernetes for Cloud Native Applications

4. Serverless for Cloud Native Applications

5. Building Secure CI/CD Pipelines

6. The 12-Factor Application Methodology

7. Using Infrastructure as Code

8. Authorization and Policy as Code

9. Implementing Immutable Infrastructure

10. Encryption and Secrets Management

11. Threat Management in Cloud Native Applications

12. Summary and Key Takeaways

作者简介

Eyal Estrin is a cloud security architect working with cloud services since 2015. He has been involved in designing and implementing cloud environments from both the IT and security aspects. He has worked with AWS, Azure, and Google Cloud in many different organizations (in the banking, academia, and healthcare sectors). He has attained several top cloud security certifications – CCSP, CCSK, and AWS. He shares his knowledge about cloud security and adoption through social media (LinkedIn, Twitter, Medium, and more) for the benefit of cloud experts worldwide.


为此电子书评分

欢迎向我们提供反馈意见。

如何阅读

智能手机和平板电脑
只要安装 AndroidiPad/iPhone 版的 Google Play 图书应用,不仅应用内容会自动与您的账号同步,还能让您随时随地在线或离线阅览图书。
笔记本电脑和台式机
您可以使用计算机的网络浏览器聆听您在 Google Play 购买的有声读物。
电子阅读器和其他设备
如果要在 Kobo 电子阅读器等电子墨水屏设备上阅读,您需要下载一个文件,并将其传输到相应设备上。若要将文件传输到受支持的电子阅读器上,请按帮助中心内的详细说明操作。