Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen
Beschreibung

Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy integrated in your code, infrastructure, and environments from day one can help.

In this practical book, authors John Walsh, Uzi Ailon, and Matt Barker provide conceptual frameworks, technology overviews, and useful code snippets to bridge the gap between development, IT, and security to integrate robust identity security across apps, CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, process automation, IoT, and more. You'll learn:

  • • What developers need to know about managing secrets and identity to build safer apps • What machine identities, secrets, and credentials are--and how to secure them • How to secure the software supply chain to build safer apps • How identity security fits into modern software development practices

Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy integrated in your code, infrastructure, and environments from day one can help.

In this practical book, authors John Walsh, Uzi Ailon, and Matt Barker provide conceptual frameworks, technology overviews, and useful code snippets to bridge the gap between development, IT, and security to integrate robust identity security across apps, CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, process automation, IoT, and more. You'll learn:

  • • What developers need to know about managing secrets and identity to build safer apps • What machine identities, secrets, and credentials are--and how to secure them • How to secure the software supply chain to build safer apps • How identity security fits into modern software development practices
Über den Autor
John Walsh is a distinguished authority in software security, with over 15 years of experience in various roles within enterprise security companies. From software developer to product manager, product marketing, and open-source community manager, his diverse background has equipped him with a comprehensive understanding of securing the entire software supply chain. This unique perspective enables him to communicate the intricacies of enterprise software security with clarity and depth, catering to both technical and non-technical audiences.
Details
Erscheinungsjahr: 2025
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: Einband - flex.(Paperback)
ISBN-13: 9781098158033
ISBN-10: 1098158032
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Walsh, John
Ailon, Uzi
Barker, Matt
Hersteller: O'Reilly Media
Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de
Maße: 230 x 174 x 13 mm
Von/Mit: John Walsh (u. a.)
Erscheinungsdatum: 10.06.2025
Gewicht: 0,384 kg
Artikel-ID: 133185653

Ähnliche Produkte