Book Image

Cloud Native Development Patterns and Best Practices

By : John Gilbert
Book Image

Cloud Native Development Patterns and Best Practices

By: John Gilbert

Overview of this book

Build systems that leverage the benefits of the cloud and applications faster than ever before with cloud-native development. This book focuses on architectural patterns for building highly scalable cloud-native systems. You will learn how the combination of cloud, reactive principles, devops, and automation enable teams to continuously deliver innovation with confidence. Begin by learning the core concepts that make these systems unique. You will explore foundational patterns that turn your database inside out to achieve massive scalability with cloud-native databases. You will also learn how to continuously deliver production code with confidence by shifting deployment and testing all the way to the left and implementing continuous observability in production. There's more—you will also learn how to strangle your monolith and design an evolving cloud-native system. By the end of the book, you will have the ability to create modern cloud-native systems.
Table of Contents (12 chapters)

Regulatory compliance

Compliance with the many security certifications, regulations, and frameworks, such as SOC, PCI, and HIPAA, is of extreme importance to cloud providers because it is important to cloud consumers. This is evident by the extent to which a cloud provider's value-added services have been approved under these different assurance programs. Simply put, as cloud customers, we are subject to these assurance programs, therefore we must choose a cloud provider that has been approved as well. Failing to support a specific program can be a competitive disadvantage for a cloud provider.

This is another benefit of the shared responsibility model. As we draw the line higher and higher with the use of value-added cloud services, we also inherit more and more security controls from the cloud provider. This, in turn, allows us to focus our attention on the security controls...