BOOKS - Security for Cloud Native Applications The practical guide for securing moder...
US $5.82
36267
36267
Security for Cloud Native Applications The practical guide for securing modern applications using AWS, Azure, and GCP
Author: Eyal Estrin
Year: 2024
Number of pages: 312
Format: PDF | EPUB
File size: 11.2 MB
Language: ENG
Year: 2024
Number of pages: 312
Format: PDF | EPUB
File size: 11.2 MB
Language: ENG
Security for cloud-native applications is an overview of cloud-native application's characteristics from a security point of view, filled with best practices for securing services based on AWS, Azure, and GCP infrastructure. This book is a practical guide for securing cloud-native applications throughout their lifecycle. It establishes foundational knowledge of cloud services and cloud-native characteristics. It focuses on securing design approaches like APIs, microservices, and event-driven architectures. Specific technologies like containers, Kubernetes, and serverless functions are covered with security best practices. The book emphasizes integrating security throughout development using CICD pipelines and IaC tools. It explores policy as code for enforcing security policies and immutable infrastructure for enhanced security posture. Key management and threat detection strategies are also covered. Finally, the book offers a practical example and resources for further learning. Kubernetes is considered the de facto standard for Container orchestrators. It allows you to deploy applications on a large scale and spin up or down new containers, according to application load, ensuring all containers are healthy (otherwise, Kubernetes deploys new containers to replace the unhealthy ones). There are many benefits to choosing Kubernetes as an orchestrator for provisioning modern applications using containers. Kubernetes can be deployed and run almost anywhere, from managed cloud environments to on-prem clusters (local data centers) and at the edge where compute and storage resources are close to data generation. By the end of the book, the reader will be able to design and secure modern applications using the public cloud scale, managed services, automation, and built-in security controls.