O'Reilly logo

Cloud Native Architectures by Piyum Zonooz, Erik Farr, Kamal Arora, Tom Laszewski

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we discussed how security needs to adapt to a cloud native world. The old processes around applying security are largely obsolete, and a new approach is needed. We discussed the mindset of applying security at every layer and what essential features make up a secure cloud native stack. They are compliant, encrypted with scalable/available encryption resources, utilize DLP technology to automatically prevent exposure of data, employ caching to prevent user data from being written in application memory, and finally have secure credentials and endpoints to enable people to interact with the stack safely.

We introduced a number of cloud security services that exist on CSPs today. These include security groups, NACLs, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required