Security as Code

DevSecOps Patterns with AWS


Security as Code
Security as Code
Compliments of Nginx

Book Details

Authors BK Sarthak Das, Virginia Chu
Publisher O'Reilly Media
Published 2023
Edition 1
Paperback 122 pages
Language English
ISBN-13 9781098127466
ISBN-10 1098127463
License Compliments of Nginx

Book Description

DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. In order to build secure and resilient applications, you have to be equipped with security knowledge. Enter security as code.

In this book, authors BK Sarthak Das and Virginia Chu demonstrate how to use this methodology to secure any application and infrastructure you want to deploy. With Security as Code, you'll learn how to create a secure containerized application with Kubernetes using CI/CD tooling from AWS and open source providers.

This practical book also provides common patterns and methods to securely develop infrastructure for resilient and highly available backups that you can restore with just minimal manual intervention.

- Learn the tools of the trade, using Kubernetes and the AWS Code Suite.
- Set up infrastructure as code and run scans to detect misconfigured resources in your code.
- Create secure logging patterns with CloudWatch and other tools.
- Restrict system access to authorized users with role-based access control (RBAC).
- Inject faults to test the resiliency of your application with AWS Fault Injector or open source tooling.
- Learn how to pull everything together into one deployment.


This book is published as open-access, which means it is freely available to read, download, and share without restrictions.

If you enjoyed the book and would like to support the author, you can purchase a printed copy (hardcover or paperback) from official retailers.

Download and Read Links

PDF

Share this Book

[localhost]# find . -name "*Similar_Books*"


Demystifying Internet of Things Security

Security

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Inte

Managing Risk and Information Security

Security

Managing Risk and Information Security: Protect to Enable, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving

Load Balancing in the Cloud

Nginx AWS Cloud

Use of redundant servers has long been a solution for meeting sudden spikes in demand, machine failures, and outages. Cloud services greatly reduce the cost and hassle of provisioning redundant equipment and load balancers and give you the ability to deal with separate network, application, and client-side loads. But today there are many options to

Patterns for Beginning Programmers

Java

Programming patterns are solutions to problems that require the creation of a small fragment of code that will be part of a larger program. Hence, this book is about teaching you how to write such fragments of code. However, it is not about teaching you the syntax of the statements in the fragments, it assumes that you already know the syntax. Inst

Building the Infrastructure for Cloud Security

Cloud Security

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece

Managing Risk and Information Security, 2nd Edition

Security

Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Ri