Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

Buy

Protect your organization's security at all levels by introducing the latest strategies for securing DevOps

Key Features

  • Integrate security at each layer of the DevOps pipeline
  • Discover security practices to protect your cloud services by detecting fraud and intrusion
  • Explore solutions to infrastructure security using DevOps principles

Book Description

DevOps has provided speed and quality benefits with continuous development and deployment methods, but it does not guarantee the security of an entire organization. Hands-On Security in DevOps shows you how to adopt DevOps techniques to continuously improve your organization’s security at every level, rather than just focusing on protecting your infrastructure.

This guide combines DevOps and security to help you to protect cloud services, and teaches you how to use techniques to integrate security directly in your product. You will learn how to implement security at every layer, such as for the web application, cloud infrastructure, communication, and the delivery pipeline layers. With the help of practical examples, you’ll explore the core security aspects, such as blocking attacks, fraud detection, cloud forensics, and incident response. In the concluding chapters, you will cover topics on extending DevOps security, such as risk assessment, threat modeling, and continuous security.

By the end of this book, you will be well-versed in implementing security in all layers of your organization and be confident in monitoring and blocking attacks throughout your cloud services.

What you will learn

  • Understand DevSecOps culture and organization
  • Learn security requirements, management, and metrics
  • Secure your architecture design by looking at threat modeling, coding tools and practices
  • Handle most common security issues and explore black and white-box testing tools and practices
  • Work with security monitoring toolkits and online fraud detection rules
  • Explore GDPR and PII handling case studies to understand the DevSecOps lifecycle

Who this book is for

Hands-On Security in DevOps is for system administrators, security consultants, and DevOps engineers who want to secure their entire organization. Basic understanding of Cloud computing, automation frameworks, and programming is necessary.

Table of Contents

  1. DevSecOps Drivers and Challenges
  2. Security Goal and Metrics
  3. Security Assurance Program and Organization
  4. Security Requirements and Compliance
  5. Case Study: Security Assurance Program
  6. Security Architecture, Common Modules Framework, Design Principles
  7. Threat modeling Practices & Secure Design
  8. Secure Coding Baseline, Tools and Best Practices
  9. Case Study: Continuous releases with security by default
  10. Security Testing Plan and Cases
  11. WhiteBox Testing Tips
  12. Security Testing toolkits
  13. Automation - Key to built-in security CI pipeline
  14. Incident Response
  15. Security Monitoring
  16. Security Scanning for new Releases releases
  17. Threat Inspection and Intelligence
  18. Business Fraud, Accounts and Services Abuses detection
  19. GDPR compliance case study
  20. DevSecOps Challenges, Tips and FAQ
(HTML tags aren't allowed.)

Musculoskeletal Examination
Musculoskeletal Examination
Musculoskeletal Examination is a user-friendly textbook designed for students, physical therapists and physicians. It is uniquely multidisciplinary in its approach, being written by a physiatrist, physical therapist and orthopedist. With tables and boxed features to emphasize and summarize key concepts, and 'sample examination' boxes...
Practical Guide to Clinical Computing Systems: Design, Operations, and Infrastructure
Practical Guide to Clinical Computing Systems: Design, Operations, and Infrastructure
The development of clinical computing systems is a rapidly growing priority area of health information technology, spurred in large measure by robust funding at the federal and state levels. It is widely recognized as one of the key components for reducing costs and improving the quality of care. At the same time as more and more hospitals and...
FISMA Compliance Handbook: Second Edition
FISMA Compliance Handbook: Second Edition

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed.

This book...


Filling a Need While Making Some Noise: A Music Therapist's Guide to Pediatrics
Filling a Need While Making Some Noise: A Music Therapist's Guide to Pediatrics

'This book teaches, provides painful insight, and creates awareness and empathy for the patients, families, and caregivers who are living and working every day within a framework of tragedy. This book is also great entertainment. You will laugh and cry, sometimes simultaneously, throughout your reading.'

- From the Foreword...

The Renewable Energy Transition: Realities for Canada and the World (Lecture Notes in Energy)
The Renewable Energy Transition: Realities for Canada and the World (Lecture Notes in Energy)

Canada is a well-endowed country that serves as an ideal model to lead the reader through the development of energy, resources, and society historically and into a post-carbon future. The book provides an historical perspective and describes the physical resource limitations, energy budgets, and climate realities that will...

Soft Computing: Techniques and its Applications in Electrical Engineering (Studies in Computational Intelligence)
Soft Computing: Techniques and its Applications in Electrical Engineering (Studies in Computational Intelligence)
Intuitive consciousness/ wisdom is also one of the frontline areas in soft computing, which has to be always cultivated by meditation. This book is an introduction to some new fields in soft computing with its principal components of fuzzy logic, ANN and EA and it is hoped that it would be quite useful to study the fundamental concepts on these...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy