August 2018
Intermediate to advanced
384 pages
12h 18m
English
This chapter covers
An introduction to risk management
Categorizing information into confidentiality, integrity, and availability requirements
Threat modeling with the STRIDE and DREAD frameworks
Using rapid risk assessment to integrate reviews in the DevOps process
Recording and tracking risks in the organization
At the start of the book, you secured a single, small invoicer service hosted in a basic AWS environment. Yet, it took the better part of 10 chapters to cover all the controls necessary to properly secure that one service.
Organizations don’t stay small; they grow, and as they do, security teams must audit more deployment pipelines, implement more controls in more services, and perform more incident response. ...