Application development in a trusted environment
This chapter describes how IBM Hyper Protect Services can be used to establish a trusted application development and deployment process. It shows how secure practices can be used to improve each part of the development process and different parts of deployed applications.
The chapter topics include improvements of the application lifecycle and application development, test, build, and release. It includes descriptions of initial and update deployment, and aid for secure implementation of the different ...