In this chapter, we reviewed how security is handled under Heroku. We understood in detail how security is ensured when the developer pushes code to the Heroku platform by encrypting the source code using SSH. We looked at different parts of the Heroku application life cycle and reviewed how security is enforced in each of them to ensure that the Heroku platform and the applications running on the platform are secured at all times. Finally, we learned how to use two of the many popular security tools available on the Heroku platform as add-ons to search for various security gaps and for ways to close them. In the next chapter, we will learn various techniques to take the development of apps on the Heroku platform to the next level by using several newly introduced features.
Heroku Cloud Application Development
By :
Heroku Cloud Application Development
By:
Overview of this book
Table of Contents (17 chapters)
Heroku Cloud Application Development
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Hello Heroku
Inside Heroku
Building Heroku Applications
Deploying Heroku Applications
Running Heroku Applications
Putting It All Together
Heroku Best Practices
Heroku Security
Troubleshooting Heroku Applications
Advanced Heroku Usage
Index
Customer Reviews