Book description
Cloud native applications do more than just run on a different platform. The entire scope of these applications is different, including the methodologies and skills used to build them. Security practices for these applications need a transformation of equal magnitude. With this report, you'll learn how to adapt your practices to this new organizational reality by adopting a developer-first cloud native application security (CNAS) approach.
Author Guy Podjarny explains this market transition and guides you through the organizational changes required to succeed, including alterations to security practices and tooling. Concrete examples not only help you learn the concepts but also act as an ideal way to get started in the process. By the end of this report, you'll understand why and how to embrace a CNAS approach.
- Initiate dev-first security by equipping developers with the mandate and tools to secure what they build during the development process
- Expand the scope of application security for cloud native apps to include controls that IT security previously handled
- Learn how adopting CNAS requires significant changes to the way you secure applications and infrastructure
- Adapt your organization to a dev-first CNAS approach by rethinking your security organizational structure, tooling, and priorities
Table of contents
- Preface
- 1. Digital Transformation
- 2. Dev-First Security
- 3. Securing the Entire Cloud Native App
- 4. Adapting to Dev-First CNAS
- Summary
Product information
- Title: Cloud Native Application Security
- Author(s):
- Release date: June 2021
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098105624
You might also like
book
Technology Strategy Patterns
Technologists who want their ideas heard, understood, and funded are often told to speak the language …
book
Building Micro-Frontends
What's the answer to today's increasingly complex web applications? Micro-frontends. Inspired by the microservices model, this …
book
Shifting Left for Application Security
Security is a paramount concern for developers, operations and security engineers, and company CISOs alike. Security …
book
Deciphering Data Architectures
Data fabric, data lakehouse, and data mesh have recently appeared as viable alternatives to the modern …