Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Cloud Native Software Security Handbook
  • Table Of Contents Toc
Cloud Native Software Security Handbook

Cloud Native Software Security Handbook

By : Mihir Shah
5 (5)
close
close
Cloud Native Software Security Handbook

Cloud Native Software Security Handbook

5 (5)
By: Mihir Shah

Overview of this book

For cloud security engineers, it’s crucial to look beyond the limited managed services provided by cloud vendors and make use of the wide array of cloud native tools available to developers and security professionals, which enable the implementation of security solutions at scale. This book covers technologies that secure infrastructure, containers, and runtime environments using vendor-agnostic cloud native tools under the Cloud Native Computing Foundation (CNCF). The book begins with an introduction to the whats and whys of the cloud native environment, providing a primer on the platforms that you’ll explore throughout. You’ll then progress through the book, following the phases of application development. Starting with system design choices, security trade-offs, and secure application coding techniques that every developer should be mindful of, you’ll delve into more advanced topics such as system security architecture and threat modelling practices. The book concludes by explaining the legal and regulatory frameworks governing security practices in the cloud native space and highlights real-world repercussions that companies have faced as a result of immature security practices. By the end of this book, you'll be better equipped to create secure code and system designs.
Table of Contents (16 chapters)
close
close
1
Part 1: Understanding Cloud Native Technology and Security
5
Part 2: Implementing Security in Cloud Native Environments
11
Part 3: Legal, Compliance, and Vendor Management

Integrating security tools and automating workflows

To successfully implement a SOAR platform, it’s crucial to integrate your existing security tools and automate workflows effectively. Let’s delve into this process.

Integrating security tools

A successful SOAR platform heavily relies on the integration of various security tools. These could include Security Information and Event Management (SIEM) systems, Intrusion Detection/Prevention Systems (IDSs/IPSs), TIPs, endpoint protection platforms, and many others.

The integration process typically involves configuring your security tools to send data to your SOAR platform and configuring the SOAR platform to ingest this data. This often includes specifying the data format, setting up API keys or other authentication methods, and defining which types of events should trigger alerts or automated actions.

Most SOAR platforms provide pre-built integrations with popular security tools, but it’s also possible...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Cloud Native Software Security Handbook
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon