Book description
Cloud native applications do more than just run on a different platform. The entire scope of these applications is different, including the methodologies and skills used to build them. Security practices for these applications need a transformation of equal magnitude. With this report, you'll learn how to adapt your practices to this new organizational reality by adopting a developer-first cloud native application security (CNAS) approach.
Author Guy Podjarny explains this market transition and guides you through the organizational changes required to succeed, including alterations to security practices and tooling. Concrete examples not only help you learn the concepts but also act as an ideal way to get started in the process. By the end of this report, you'll understand why and how to embrace a CNAS approach.
- Initiate dev-first security by equipping developers with the mandate and tools to secure what they build during the development process
- Expand the scope of application security for cloud native apps to include controls that IT security previously handled
- Learn how adopting CNAS requires significant changes to the way you secure applications and infrastructure
- Adapt your organization to a dev-first CNAS approach by rethinking your security organizational structure, tooling, and priorities
Table of contents
- Preface
- 1. Digital Transformation
- 2. Dev-First Security
- 3. Securing the Entire Cloud Native App
- 4. Adapting to Dev-First CNAS
- Summary
Product information
- Title: Cloud Native Application Security
- Author(s):
- Release date: June 2021
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098105624
You might also like
book
Cloud Native Security
Explore the latest and most comprehensive guide to securing your Cloud Native technology stack Cloud Native …
book
Cloud Native Security Cookbook
With the rise of the cloud, every aspect of IT has been shaken to its core. …
book
Practical Cloud Security
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and …
book
Microservices Security in Action
Unlike traditional enterprise applications, Microservices applications are collections of independent components that function as a system. …