Shopping cart
Your cart empty!
Terms of use dolor sit amet consectetur, adipisicing elit. Recusandae provident ullam aperiam quo ad non corrupti sit vel quam repellat ipsa quod sed, repellendus adipisci, ducimus ea modi odio assumenda.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Dolor sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Do you agree to our terms? Sign up
A no-fluff guide to implementing best practices for securing cloud native services.
What are the best practices to secure microservices, the latest popular wave of innovation in software engineering? This book teaches you to automate security design and verifications to keep microservices software development running smoothly and securely in a cloud-native environment.
Securing Cloud Native Apps takes you through every step of secure microservice software development and deployment for systems like Docker and Kubernetes. You’ll begin by exploring core microservices security tenets, then dive into developing microservices and securing microservices infrastructure. You’ll gain the skills to think like a security engineer at scale and effectively plan secure designs. You’ll learn to:
Perform threat monitoring to understand the security properties and risks of microservices
Implement secure authorization and authentication and secrets management
Build secure network and service mesh paradigms
Perform runtime monitoring to catch and stop attacks
Coordinate with stakeholders and software development teams
Put all these skills together with a case study covering a real company’s security practices
Each chapter provides step-by-step explanations of vital concepts, practical examples, mistakes to look out for, and quizzes to test your knowledge. Whether you’re a one-person security team or a larger group, this book equips you with the skills to build a full-fledged microservices security discipline.
Comments