• Complain

Josh Armitage - Cloud Native Security Cookbook

Here you can read online Josh Armitage - Cloud Native Security Cookbook full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: OReilly Media, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Josh Armitage Cloud Native Security Cookbook
  • Book:
    Cloud Native Security Cookbook
  • Author:
  • Publisher:
    OReilly Media
  • Genre:
  • Year:
    2022
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Cloud Native Security Cookbook: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cloud Native Security Cookbook" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

With the rise of the cloud, every aspect of IT has been shaken to its core. The fundamentals for building systems are changing, and although many of the principles that underpin security still ring true, their implementation has become unrecognizable. This practical book provides recipes for AWS, Azure, and GCP to help you enhance the security of your own cloud native systems.Based on his hard-earned experience working with some of the worlds biggest enterprises and rapidly iterating startups, consultant Josh Armitage covers the trade-offs that security professionals, developers, and infrastructure gurus need to make when working with different cloud providers. Each recipe discusses these inherent compromises, as well as where clouds have similarities and where theyre fundamentally different.

Josh Armitage: author's other books


Who wrote Cloud Native Security Cookbook? Find out the surname, the name of the author of the book and a list of all author's works by series.

Cloud Native Security Cookbook — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cloud Native Security Cookbook" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Cloud Native Security Cookbook

by Josh Armitage

Copyright 2022 Joshua Hagen Armitage. All rights reserved.

Printed in the United States of America.

Published by OReilly Media, Inc. , 1005 Gravenstein Highway North, Sebastopol, CA 95472.

OReilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://oreilly.com). For more information, contact our corporate/institutional sales department: 800-998-9938 or corporate@oreilly.com .

  • Acquisitions Editor: Jennifer Pollock
  • Development Editor: Corbin Collins
  • Production Editor: Jonathon Owen
  • Copyeditor: Sonia Saruba
  • Proofreader: Piper Editorial Consulting, LLC
  • Indexer: Judith McConville
  • Interior Designer: David Futato
  • Cover Designer: Karen Montgomery
  • Illustrator: Kate Dullea
  • April 2022: First Edition
Revision History for the First Edition
  • 2022-04-20: First Release

See http://oreilly.com/catalog/errata.csp?isbn=9781098106300 for release details.

The OReilly logo is a registered trademark of OReilly Media, Inc. Cloud Native Security Cookbook, the cover image, and related trade dress are trademarks of OReilly Media, Inc.

The views expressed in this work are those of the author and do not represent the publishers views. While the publisher and the author have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the author disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk. If any code samples or other technology this work contains or describes is subject to open source licenses or the intellectual property rights of others, it is your responsibility to ensure that your use thereof complies with such licenses and/or rights.

This work is part of a collaboration between OReilly and Palo Alto Networks. See our statement of editorial independence.

978-1-098-10630-0

[LSI]

Preface

In the early 2000s, public cloud emerged as a new a paradigm that revolutionized how technology is consumed across the world. Rather than waiting weeks to months for new computers to be ordered, delivered, and racked, access to machines is mere seconds away. The company bringing you one-click shopping was now bringing you one-click computing.

In my first job out of university, I was working in the mainframe division of IBM, building a cloud-delivered virtualized mainframe environment. We were looking to bring DevOps to the worlds most venerated enterprises. What became a focus of the customer conversations over time was security. How can they be assured that their data is safe when they upload it to the cloud?

When the cloud was making waves in even the most risk-averse industries, I became convinced that it was the way forward for businesses looking to excel in the digital age.

Since IBM, I have spent the majority of my time working as a consultant in Australia and the UK, focused on helping start-ups and enterprises alike use the cloud as their innovation engine, empowering their developers to deliver exceptional outcomes.

Through my experience I have seen many false steps, patterns, and anti-patterns that reappear as businesses and engineers make their first forays into a cloud-native world. This book is focused on how to use the cloud securely.

The recipes in this book show you how to build a secure foundation in your cloud environment and how to leverage the first-party security solutions to stay on top of your estate as it organically scales.

Who This Book Is For

This book is about getting hands-on with the cloud. Each recipe comes with a fully worked solution in Terraform, the most widely used infrastructure-as-code tool.

For each problem presented, there is a recipe for each of the three primary cloud providers, Amazon Web Services, Microsoft Azure, and Google Cloud Platform. As the modern world is becoming increasingly multi-cloud, it is ever more valuable to be cloud multilingual.

Although the three clouds have significant overlap in the services they provide, the design decisions that went into the cloud itself have massive ramifications for security. With this book youll become empowered to translate between the three clouds and rapidly solve problems wherever they present.

How This Book Is Organized

This book has nine chapters of recipes, each focused on a particular theme. These range from how to structure your estate and manage users to how to ensure compliance at scale to the intricacies of identity and access management on each cloud provider.

What You Need to Use This Book

In order to complete the recipes in this book, you will need access to your cloud of choice. Depending on the recipe, you will need highly privileged credentials to make the required changes.

All the recipes were developed using Terraform version 1.0. If you have not used Terraform before, then going through will show you how to safely authenticate against your cloud.

Conventions Used in This Book

The following typographical conventions are used in this book:

Italic

Indicates new terms, URLs, email addresses, filenames, and file extensions.

Constant width

Used for program listings, as well as within paragraphs to refer to program elements such as variable or function names, databases, data types, environment variables, statements, and keywords.

Constant width bold

Shows commands or other text that should be typed literally by the user.

Constant width italic

Shows text that should be replaced with user-supplied values or by values determined by context.

Note

This element signifies a general note.

Warning

This element indicates a warning or caution.

Using Code Examples

Supplemental material (code examples, exercises, etc.) is available for download at https://github.com/Armitagency/cloud-native-security-cookbook-tf.

If you have a technical question or a problem using the code examples, please send email to .

This book is here to help you get your job done. In general, if example code is offered with this book, you may use it in your programs and documentation. You do not need to contact us for permission unless youre reproducing a significant portion of the code. For example, writing a program that uses several chunks of code from this book does not require permission. Selling or distributing examples from OReilly books does require permission. Answering a question by citing this book and quoting example code does not require permission. Incorporating a significant amount of example code from this book into your products documentation does require permission.

We appreciate, but generally do not require, attribution. An attribution usually includes the title, author, publisher, and ISBN. For example: "Cloud Native Security Cookbook by Josh Armitage (OReilly). Copyright 2022 Joshua Hagen Armitage, 978-1-098-10630-0.

If you feel your use of code examples falls outside fair use or the permission given above, feel free to contact us at .

OReilly Online Learning
Note

For more than 40 years, OReilly Media has provided technology and business training, knowledge, and insight to help companies succeed.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cloud Native Security Cookbook»

Look at similar books to Cloud Native Security Cookbook. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cloud Native Security Cookbook»

Discussion, reviews of the book Cloud Native Security Cookbook and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.