product
841091Cloud Native Software Security Handbookhttps://www.gandhi.com.mx/securing-cloud-native-app-development/phttps://gandhi.vtexassets.com/arquivos/ids/472741/454c76b0-39bc-4f6c-a67f-667766b4ff87.jpg?v=638334950781030000665739MXNPackt PublishingInStock/Ebooks/839512Cloud Native Software Security Handbook665739https://www.gandhi.com.mx/securing-cloud-native-app-development/phttps://gandhi.vtexassets.com/arquivos/ids/472741/454c76b0-39bc-4f6c-a67f-667766b4ff87.jpg?v=638334950781030000InStockMXN99999DIEbook20239781837636525_W3siaWQiOiJmZDMzY2Q2Ni01NzQxLTQxMmEtYjE0YS0xZDg2ZTM5M2Y3NzkiLCJsaXN0UHJpY2UiOjczOSwiZGlzY291bnQiOjc0LCJzZWxsaW5nUHJpY2UiOjY2NSwiaW5jbHVkZXNUYXgiOnRydWUsInByaWNlVHlwZSI6Ildob2xlc2FsZSIsImN1cnJlbmN5IjoiTVhOIiwiZnJvbSI6IjIwMjQtMDQtMDhUMTY6MDA6MDBaIiwicmVnaW9uIjoiTVgiLCJpc1ByZW9yZGVyIjpmYWxzZX1d9781837636525_<p><strong>Become well-versed with widely used platforms like Kubernetes, cloud services, Istio, Calico, Kynervo, Snyk, Prometheus, Kibana, Grafana, Clair, Anchor, and many more within the cloud-native space to secure infrastructure and develop secure software</strong></p><h4>Key Features</h4><ul><li>Learn how to select cloud-native platforms and integrate security solutions into the overall system</li><li>Leverage cutting-edge tools and platforms and use them, securely, at a global scale in production</li><li>Discover the laws and regulations that you should be aware of to avoid federal prosecution</li></ul><h4>Book Description</h4><p>For a Cloud security engineer, it is crucial to think beyond the few managed services provided by the cloud vendor and truly use the plethora of cloud-native tools available for developers and security professionals, which allow for providing security solutions at scale. In this book, we cover technologies for securing the infrastructure, containers, and runtime environments using vendor-agnostic cloud-native tools under the CNCF.</p><p>The book begins by introducing the what and whys of the cloud-native environment along with a primer about the platforms that we would be exploring ongoing in the book. We then progress in the book as one would in the development phase of an application. We continue by exploring the System design choices and security trade-offs and then secure application coding techniques that every developer should be mindful of. As we move into more advanced topics, we look into the security architecture of the system and threat modelling practices, and we conclude by explaining the laws and guidelines regulating security practices in the cloud native space while exploring some real-world repercussions that companies have faced in the past due to a companys immature security practices.</p><p>By the end of the book, youll find yourself better positioned in creating secure safe code and system designs.</p><h4>What you will learn</h4><ul><li>Learn security concerns and challenges for cloud-based app development</li><li>Explore various tools for securing config, networks, and runtime</li><li>Implementing threat modeling for risk mitigation strategies</li><li>Implement various security solutions for the CI/CD pipeline</li><li>Discover best practices for logging, monitoring, and alerting</li><li>Understand regulatory compliance product impact on cloud security</li></ul><h4>Who This Book Is For</h4><p>The target audience for the book would be developers, security professionals, and DevOps teams who are involved in designing, developing, and deploying cloud-native applications. It is intended for those with a technical background who want to gain a deeper understanding of cloud-native security and learn about the latest tools and technologies for securing cloud-native infrastructure and runtime environments. Having prior experience with cloud vendors and their managed services would be a plus to leveraging all the tools and platforms explained in this book.</p><h4>Table of Contents</h4><ol><li>Understanding Cloud Native Architecture</li><li>Secure System Design using Cloud Native</li><li>Application Development practices in Cloud Native world</li><li>Developing a Secure Coding Culture</li><li>Threat Modeling for Cloud Native</li><li>Securing the Infrastructure</li><li>Cloud Security Operations</li><li>DevSecOps Practices for Cloud Native</li><li>Legal and Compliance Issues</li><li>Cloud Native Vendor Management and Security Certifications</li></ol>...(*_*)9781837636525_<p><b>Master widely used cloud native platforms like Kubernetes, Calico, Kibana, Grafana, Anchor, and more to ensure secure infrastructure and software development Purchase of the print or Kindle book includes a free PDF eBook</b></p><h4>Key Features</h4><ul><li>Learn how to select cloud-native platforms and integrate security solutions into the system</li><li>Leverage cutting-edge tools and platforms securely on a global scale in production environments</li><li>Understand the laws and regulations necessary to prevent federal prosecution</li></ul><h4>Book Description</h4>For cloud security engineers, its crucial to look beyond the limited managed services provided by cloud vendors and make use of the wide array of cloud native tools available to developers and security professionals, which enable the implementation of security solutions at scale. This book covers technologies that secure infrastructure, containers, and runtime environments using vendor-agnostic cloud native tools under the Cloud Native Computing Foundation (CNCF). The book begins with an introduction to the whats and whys of the cloud native environment, providing a primer on the platforms that youll explore throughout. Youll then progress through the book, following the phases of application development. Starting with system design choices, security trade-offs, and secure application coding techniques that every developer should be mindful of, youll delve into more advanced topics such as system security architecture and threat modelling practices. The book concludes by explaining the legal and regulatory frameworks governing security practices in the cloud native space and highlights real-world repercussions that companies have faced as a result of immature security practices. By the end of this book, youll be better equipped to create secure code and system designs.<h4>What you will learn</h4><ul><li>Understand security concerns and challenges related to cloud-based app development</li><li>Explore the different tools for securing configurations, networks, and runtime</li><li>Implement threat modeling for risk mitigation strategies</li><li>Deploy various security solutions for the CI/CD pipeline</li><li>Discover best practices for logging, monitoring, and alerting</li><li>Understand regulatory compliance product impact on cloud security</li></ul><h4>Who this book is for</h4><p>This book is for developers, security professionals, and DevOps teams involved in designing, developing, and deploying cloud native applications. It benefits those with a technical background seeking a deeper understanding of cloud-native security and the latest tools and technologies for securing cloud native infrastructure and runtime environments. Prior experience with cloud vendors and their managed services is advantageous for leveraging the tools and platforms covered in this book.</p>...9781837636525_Packt Publishinglibro_electonico_bca752d2-a58d-31df-a6d0-40a6b27a81dd_9781837636525;9781837636525_9781837636525Mihir ShahInglésMéxicohttps://getbook.kobo.com/koboid-prod-public/packt-epub-cf763819-e4e2-4491-813c-b382612b0b11.epub2023-08-25T00:00:00+00:00Packt Publishing