CyberSecurity Summary

Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud


Listen Later

This Book is a comprehensive guide to serverless security, focusing on the implementation of secure practices across AWS, Azure, and Google Cloud platforms. It covers various aspects, including securing application code, restricting permissions, managing accounts and secrets, implementing authentication and authorization, protecting sensitive data, and establishing robust monitoring, auditing, and alerting systems. The text provides practical examples and exercises to illustrate key concepts, along with a detailed explanation of the underlying security principles involved. Furthermore, it addresses the balancing of security with other development requirements and the importance of CI/CD pipelines and source control. Finally, it guides the reader through finalizing a risk assessment by considering business impact and prioritizing mitigation strategies.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Get the Book now from Amazon:
https://www.amazon.com/Serverless-Security-Understand-Implement-Applications/dp/1484260996?&linkCode=ll1&tag=cvthunderx-20&linkId=2b667c7b976771478cbafb9d999c8903&language=en_US&ref_=as_li_ss_tl
...more
View all episodesView all episodes
Download on the App Store

CyberSecurity SummaryBy CyberSecurity Summary