Book Image

Architecting Cloud Native Applications

By : Kamal Arora, Erik Farr, John Gilbert, Piyum Zonooz
Book Image

Architecting Cloud Native Applications

By: Kamal Arora, Erik Farr, John Gilbert, Piyum Zonooz

Overview of this book

Cloud computing has proven to be the most revolutionary IT development since virtualization. Cloud native architectures give you the benefit of more flexibility over legacy systems. This Learning Path teaches you everything you need to know for designing industry-grade cloud applications and efficiently migrating your business to the cloud. It begins by exploring the basic patterns that turn your database inside out to achieve massive scalability. You’ll learn how to develop cloud native architectures using microservices and serverless computing as your design principles. Then, you’ll explore ways to continuously deliver production code by implementing continuous observability in production. In the concluding chapters, you’ll learn about various public cloud architectures ranging from AWS and Azure to the Google Cloud Platform, and understand the future trends and expectations of cloud providers. By the end of this Learning Path, you’ll have learned the techniques to adopt cloud native architectures that meet your business requirements. This Learning Path includes content from the following Packt products: • Cloud Native Development Patterns and Best Practices by John Gilbert • Cloud Native Architectures by Erik Farr et al.
Table of Contents (24 chapters)
Title Page
Copyright and Credits
About Packt
Contributors
Preface
Index

Shared responsibility model


Security is arguably the biggest hurdle to cloud adoption. It takes a lot of confidence for a company to delegate its security responsibilities to a cloud provider. There is that word confidence again. This lack of confidence is certainly understandable to some degree because security is a complicated topic with many layers. However, how can any company rapidly and continuously deliver innovation to market with the confidence that they have met all their security obligations? One of my customers put it best when he said, “There is no way I can build a system as secure as I can in the cloud, because I simply do not have the resources to do so.”

Every company has a value proposition and its core competencies are focused on that mission. When push comes to shove, because the time to market is of the essence, it is not unusual for security to get shortchanged. If you need an example, ask yourself if your system relies solely on disk level encryption to secure your...