• Complain

Miguel A. Calles - Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud

Here you can read online Miguel A. Calles - Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2020, publisher: Apress, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Miguel A. Calles Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud
  • Book:
    Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Year:
    2020
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Apply the basics of security in serverless computing to new or existing projects. This hands-on guide provides practical examples and fundamentals. You will apply these fundamentals in all aspects of serverless computing: improving the code, securing the application, and protecting the infrastructure. You will come away having security knowledge that enables you to secure a project you are supporting and have technical conversations with cybersecurity personnel.

At a time when there are many news stories on cybersecurity breaches, it is crucial to think about security in your applications. It is tempting to believe that having a third-party host the entire computing platform will increase security. This book shows you why cybersecurity is the responsibility of everyone working on the project.


What You Will Learn

  • Gain a deeper understanding of cybersecurity in serverless computing
  • Know how to use free and open source tools (such as the Node Package Manager, ESLint, and VSCode) to reduce vulnerabilities in your application code
  • Assess potential threats from event triggers in your serverless functions
  • Understand security best practices in serverless computing
  • Develop an agnostic security architecture while reducing risk from vendor-specific infrastructure


Who This Book Is For

Developers or security engineers looking to expand their current knowledge of traditional cybersecurity into serverless computing projects. Individuals just beginning in serverless computing and cybersecurity can apply the concepts in this book in their projects.

Miguel A. Calles: author's other books


Who wrote Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud? Find out the surname, the name of the author of the book and a list of all author's works by series.

Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Miguel A Calles Serverless Security Understand Assess and Implement Secure - photo 1
Miguel A. Calles
Serverless Security
Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud
1st ed.
Miguel A Calles La Habra CA USA Any source code or other supplementary - photo 2
Miguel A. Calles
La Habra, CA, USA

Any source code or other supplementary material referenced by the author in this book is available to readers on GitHub via the books product page, located at www.apress.com/978-1-4842-6099-9 . For more detailed information, please visit http://www.apress.com/source-code .

ISBN 978-1-4842-6099-9 e-ISBN 978-1-4842-6100-2
https://doi.org/10.1007/978-1-4842-6100-2
Miguel A. Calles 2020
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Distributed to the book trade worldwide by Springer Science+Business Media New York, 1 NY Plaza, New York NY 10004. Phone 1-800-SPRINGER, fax (201) 348-4505, e-mail orders-ny@springer-sbm.com, or visit www.springeronline.com. Apress Media, LLC is a California LLC and the sole member (owner) is Springer Science + Business Media Finance Inc (SSBM Finance Inc). SSBM Finance Inc is a Delaware corporation.
Introduction

When I started working with the Serverless Framework, I was curious about the security aspect. I was transitioning to a project for a mobile app with a serverless back end. Previously, I was an information assurance (IA) engineer working on Cybersecurity for US Government military systems. I had become accustomed to using well-defined processes and requirements in my role as an IA engineer. The systems we were securing were part of a vast network of other systems with strict IA requirements. The threats seemed limited; and implementing Cybersecurity, in many cases, was following a list of checklists and requirements. But, Cybersecurity in the world of serverless development was a new frontier.

The more I worked with serverless, the more I wondered about its Cybersecurity. Cybersecurity with serverless projects seemed to lack the oversight that I experienced in the IA world. The team could release a serverless application without addressing security. I searched for serverless security and found limited information. I did find some helpful documents on the top serverless security risks and well-written blog posts about specific topics. I was looking for a book that provided an overview of serverless security and guidance on approaching it.

I decided to write this book with the intent to fill that void and provide a resource that addressed multiple aspects of serverless security. I leveraged my IA and Cybersecurity experience, my hands-on experience with serverless, and my research to write this book. In one perspective, this book provides an overview of serverless security. You could be new to serverless and learn how to approach serverless security by performing a risk assessment. From another perspective, this book provides practical ways to address serverless security. You could be looking for examples and recommendations to implement in your serverless projects. I am excited to share this book with you because I believe it will guide you in identifying areas of consideration when securing your serverless application.

Acknowledgments
I would like to express thanks to the following persons and organizations:
  • My wife and kids for supporting me in this endeavor.

  • My mentor J.R. Richardson for helping me in my professional development and encouraging me to explore new ways to grow.

  • David Gershman for introducing me to the field of Cybersecurity and throughly reviewing this book.

  • Guise Bule for inviting me to join Secjuice (a blog site that promotes writing about Cybersecurity and information security), where I first started writing about Cybersecurity and serverless computing topics.

  • David Huang from Paradigm Sift for his friendship since my college days and helping me troubleshoot a topic in Chapter .

  • VeriToll (my employer at the time of this writing) for allowing me to write this book and introducing me to the world of serverless computing.

  • Raytheon, before they became Raytheon Technologies, for the several years of writing technical manuals and design documents that prepared me for writing my first published book.

  • Several teachers that had a lasting impact on my education Ms. Mary Lang, Mr. Michael Swatek, and Professor Fiona Barnes.

  • Apress for allowing me to share what I have learned about Cybersecurity in serverless computing.

  • Last but not least, my Creator for helping me achieve a life goal and His provision.

Table of Contents
About the Author
Miguel A. Calles

is a certified Cybersecurity engineer, works on cloud computing projects, and writes about Cybersecurity. He has worked on multiple serverless projects as a developer and security engineer, contributed to open source serverless projects, and worked on large military systems in various engineering roles. He started in Cybersecurity in 2016 for a US government contract, has been doing technical writing since 2007, and has worked in multiple engineering roles since 2004. Miguel started to gain interest in Cybersecurity when he was in middle school and was trying to reverse engineer websites.

Miguel is a Principal Solutions and Security Engineer at VeriToll, LLC. He has a Bachelor of Science degree in Material Science and Engineering from the Massachusetts Institute of Technology, a Master of Business Administrator degree from the University of Florida, a Cloud Security Alliances Certificate of Cloud Security Knowledge certification, and a CompTIA A+ certification.

About the Technical Reviewer
David A. Gershman

is a Cybersecurity engineer for a government contractor and has the CISSP certification. He has also taught Computer Science at California Polytechnic University, Pomona, on topics ranging from introduction programming to computer networking and Cybersecurity for over 20 years. In his spare time, David enjoys restoring and programming retro 8-bit computers.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud»

Look at similar books to Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud»

Discussion, reviews of the book Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.