2
Cloud Native Systems Security Management
In this chapter, we will be diving into the various security solutions that should be implemented while developing cloud-native systems. Cloud-native systems have become increasingly popular in recent years, but with this increased adoption, security has become a critical concern. This chapter aims to provide you with a comprehensive understanding of the various tools and techniques that can be used to secure cloud-native systems, and how they can be integrated to provide a secure and compliant cloud-native environment.
In this chapter, we’re going to cover the following main topics:
- Secure configuration management using OPA
- Secure image management using Harbor
By the end of this chapter, you will ...
Get Cloud Native Software Security Handbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.