Book Image

The Cloud Adoption Playbook

By : Moe Abdula, Ingo Averdunk, Roland Barcia, Kyle Brown, Ndu Emuchay
Book Image

The Cloud Adoption Playbook

By: Moe Abdula, Ingo Averdunk, Roland Barcia, Kyle Brown, Ndu Emuchay

Overview of this book

As cloud technologies continue to challenge the fundamental understanding of how businesses work, smart companies are moving quickly to adapt to a changing set of rules. Adopting the cloud requires a clear roadmap backed by use cases, grounded in practical real-world experience, to show the routes to successful adoption. The Cloud Adoption Playbook helps business and technology leaders in enterprise organizations sort through the options and make the best choices for accelerating cloud adoption and digital transformation. Written by a team of IBM technical executives with a wealth of real-world client experience, this book cuts through the hype, answers your questions, and helps you tailor your cloud adoption and digital transformation journey to the needs of your organization.
Table of Contents (17 chapters)
Free Chapter
1
Cover
2
Title Page
3
Foreword
16
Index
17
End User License Agreement

What Does a Secure Cloud-Native System Look Like?

When developing applications, you need to use secure engineering practices to build security into the foundation of your application. Following these practices prevents applications or services from introducing vulnerabilities, which are exploitable and present risks to customers.

These practices include

  • Secure design that mitigates risks
  • Secure coding guides and practices that prevent vulnerabilities
  • Security testing to fix problems before the app is deployed and to validate that the product is free of known security issues

You must have all these components present in your development life cycle to ensure that the application you’re developing is secure and free of vulnerabilities.

Consider a simple example that is compatible with the discussions presented earlier in this chapter and in Chapter 5 on Architecture. This example is a composite of several customer examples, but it shows the decisions that go into building a secure...