-
Book Overview & Buying
-
Table Of Contents
Software Architecture with C++ - Second Edition
By :
In the previous chapter, we discussed how to build and deploy applications efficiently using continuous integration/continuous deployment (CI/CD). Now, we turn our attention to security, ensuring that the code, dependencies, and environments involved in deployment are robust and resilient. This chapter describes how to assess the security of the code base, including both the internally developed software as well as third-party modules. It will also show how to improve existing software at the code, dependency, and operating system levels. Keep in mind, though, that following every step outlined within this chapter won’t necessarily protect you against all possible problems. Our aim is to show you some possible dangers and the ways to deal with them. Given this, you should always be conscious of the security of your system and make audits a routine event.
The following topics will be covered in this chapter: