Application development in a trusted environment
This chapter describes how IBM Hyper Protect Services can be used to establish a trusted application development and deployment process. It shows how secure practices can be used to improve each part of the development process and different parts of deployed applications.
The chapter topics include improvements of the application lifecycle and application development, test, build, and release. It includes descriptions of initial and update deployment, and aid for secure implementation of the different ...

Get IBM Hyper Protect Platform: Applying Data Protection and Confidentiality in a Hybrid Cloud Environment now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.