Book Image

Cloud Native Development Patterns and Best Practices

By : John Gilbert
Book Image

Cloud Native Development Patterns and Best Practices

By: John Gilbert

Overview of this book

Build systems that leverage the benefits of the cloud and applications faster than ever before with cloud-native development. This book focuses on architectural patterns for building highly scalable cloud-native systems. You will learn how the combination of cloud, reactive principles, devops, and automation enable teams to continuously deliver innovation with confidence. Begin by learning the core concepts that make these systems unique. You will explore foundational patterns that turn your database inside out to achieve massive scalability with cloud-native databases. You will also learn how to continuously deliver production code with confidence by shifting deployment and testing all the way to the left and implementing continuous observability in production. There's more—you will also learn how to strangle your monolith and design an evolving cloud-native system. By the end of the book, you will have the ability to create modern cloud-native systems.
Table of Contents (12 chapters)

Security

In the previous chapter, we continued our deep dive into the human factors of cloud-native. We discussed the need to maximize the observability of our cloud-native systems. We shifted some testing all the way into production, where we continuously monitor key performance indicators and focus on the mean time to recovery in an effort to increase our confidence in the stability of our cloud-native systems. We also discussed how observability enables continuous performance tuning and improvement.

In this chapter, we will continue to discuss the human factors of cloud-native. We leverage the shared responsibility model of cloud-native security and adopt the practice of security-by-design to implement secure systems. We cover the following topics:

  • Shared responsibility model
  • Security by design
  • Accounts as code
  • Defense in depth
  • Encryption
  • Disaster recovery
  • Application security...