This Book is a comprehensive guide to serverless security, focusing on the implementation of secure practices across AWS, Azure, and Google Cloud platforms. It covers various aspects, including securing application code, restricting permissions, managing accounts and secrets, implementing authentication and authorization, protecting sensitive data, and establishing robust monitoring, auditing, and alerting systems. The text provides practical examples and exercises to illustrate key concepts, along with a detailed explanation of the underlying security principles involved. Furthermore, it addresses the balancing of security with other development requirements and the importance of CI/CD pipelines and source control. Finally, it guides the reader through finalizing a risk assessment by considering business impact and prioritizing mitigation strategies.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Serverless-Security-Understand-Implement-Applications/dp/1484260996?&linkCode=ll1&tag=cvthunderx-20&linkId=2b667c7b976771478cbafb9d999c8903&language=en_US&ref_=as_li_ss_tl