Book Image

Architecting Cloud Native Applications

By : Kamal Arora, Erik Farr, John Gilbert, Piyum Zonooz
Book Image

Architecting Cloud Native Applications

By: Kamal Arora, Erik Farr, John Gilbert, Piyum Zonooz

Overview of this book

Cloud computing has proven to be the most revolutionary IT development since virtualization. Cloud native architectures give you the benefit of more flexibility over legacy systems. This Learning Path teaches you everything you need to know for designing industry-grade cloud applications and efficiently migrating your business to the cloud. It begins by exploring the basic patterns that turn your database inside out to achieve massive scalability. You’ll learn how to develop cloud native architectures using microservices and serverless computing as your design principles. Then, you’ll explore ways to continuously deliver production code by implementing continuous observability in production. In the concluding chapters, you’ll learn about various public cloud architectures ranging from AWS and Azure to the Google Cloud Platform, and understand the future trends and expectations of cloud providers. By the end of this Learning Path, you’ll have learned the techniques to adopt cloud native architectures that meet your business requirements. This Learning Path includes content from the following Packt products: • Cloud Native Development Patterns and Best Practices by John Gilbert • Cloud Native Architectures by Erik Farr et al.
Table of Contents (24 chapters)
Title Page
Copyright and Credits
About Packt
Contributors
Preface
Index

Security by design


Security-by-design, security-as-code, and security-first are all themes regarding how we as an industry can improve our ability to deliver secure systems. Security-first is certainly a good theme because we simply cannot graft security onto our systems after the fact. However, we need more than security-first. We need a continuous focus on security.

Security-as-code is extremely important. Human error is the root cause of the vast majority of system breaches. This human error can be the inevitable result of configuration drift, as systems are manually configured, patched, and tuned to the point that there is no conformity or traceability and quality suffers. Or human error can result when the sheer effort required to manually patch a system with a known security fix leads to an inertia that leaves value information exposed. Our cloud-native systems are powered by the automation of disposable infrastructure, which leads to high quality, conformity, and traceability. To be...