Book Image

Architecting Cloud Native Applications

By : Kamal Arora, Erik Farr, John Gilbert, Piyum Zonooz
Book Image

Architecting Cloud Native Applications

By: Kamal Arora, Erik Farr, John Gilbert, Piyum Zonooz

Overview of this book

Cloud computing has proven to be the most revolutionary IT development since virtualization. Cloud native architectures give you the benefit of more flexibility over legacy systems. This Learning Path teaches you everything you need to know for designing industry-grade cloud applications and efficiently migrating your business to the cloud. It begins by exploring the basic patterns that turn your database inside out to achieve massive scalability. You’ll learn how to develop cloud native architectures using microservices and serverless computing as your design principles. Then, you’ll explore ways to continuously deliver production code by implementing continuous observability in production. In the concluding chapters, you’ll learn about various public cloud architectures ranging from AWS and Azure to the Google Cloud Platform, and understand the future trends and expectations of cloud providers. By the end of this Learning Path, you’ll have learned the techniques to adopt cloud native architectures that meet your business requirements. This Learning Path includes content from the following Packt products: • Cloud Native Development Patterns and Best Practices by John Gilbert • Cloud Native Architectures by Erik Farr et al.
Table of Contents (24 chapters)
Title Page
Copyright and Credits
About Packt
Contributors
Preface
Index

Summary


In this chapter, we discussed how the shared responsibility model of cloud security, when combined with value-added cloud services, enables teams to focus their energies on the security of their data. We leverage the practices of security-by-design and security-as-code to increase confidence in the security of cloud-native systems by eliminating the human factors of implementing defense-in-depth policies, such as least privilege and encryption, through automation. Nevertheless, we discussed safeguards to ensure continuity of service in the event that we need to recover from a disaster. In addition to overall system security, we discussed application level security topics, such as OAuth, OpenID Connect, and JWT. We also discussed how the increased quality, conformity, and traceability of cloud-native systems facilitate regulatory compliance.