Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

Buy

Protect your organization's security at all levels by introducing the latest strategies for securing DevOps

Key Features

  • Integrate security at each layer of the DevOps pipeline
  • Discover security practices to protect your cloud services by detecting fraud and intrusion
  • Explore solutions to infrastructure security using DevOps principles

Book Description

DevOps has provided speed and quality benefits with continuous development and deployment methods, but it does not guarantee the security of an entire organization. Hands-On Security in DevOps shows you how to adopt DevOps techniques to continuously improve your organization’s security at every level, rather than just focusing on protecting your infrastructure.

This guide combines DevOps and security to help you to protect cloud services, and teaches you how to use techniques to integrate security directly in your product. You will learn how to implement security at every layer, such as for the web application, cloud infrastructure, communication, and the delivery pipeline layers. With the help of practical examples, you’ll explore the core security aspects, such as blocking attacks, fraud detection, cloud forensics, and incident response. In the concluding chapters, you will cover topics on extending DevOps security, such as risk assessment, threat modeling, and continuous security.

By the end of this book, you will be well-versed in implementing security in all layers of your organization and be confident in monitoring and blocking attacks throughout your cloud services.

What you will learn

  • Understand DevSecOps culture and organization
  • Learn security requirements, management, and metrics
  • Secure your architecture design by looking at threat modeling, coding tools and practices
  • Handle most common security issues and explore black and white-box testing tools and practices
  • Work with security monitoring toolkits and online fraud detection rules
  • Explore GDPR and PII handling case studies to understand the DevSecOps lifecycle

Who this book is for

Hands-On Security in DevOps is for system administrators, security consultants, and DevOps engineers who want to secure their entire organization. Basic understanding of Cloud computing, automation frameworks, and programming is necessary.

Table of Contents

  1. DevSecOps Drivers and Challenges
  2. Security Goal and Metrics
  3. Security Assurance Program and Organization
  4. Security Requirements and Compliance
  5. Case Study: Security Assurance Program
  6. Security Architecture, Common Modules Framework, Design Principles
  7. Threat modeling Practices & Secure Design
  8. Secure Coding Baseline, Tools and Best Practices
  9. Case Study: Continuous releases with security by default
  10. Security Testing Plan and Cases
  11. WhiteBox Testing Tips
  12. Security Testing toolkits
  13. Automation - Key to built-in security CI pipeline
  14. Incident Response
  15. Security Monitoring
  16. Security Scanning for new Releases releases
  17. Threat Inspection and Intelligence
  18. Business Fraud, Accounts and Services Abuses detection
  19. GDPR compliance case study
  20. DevSecOps Challenges, Tips and FAQ
(HTML tags aren't allowed.)

Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms
Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms

Randomization has become a standard approach in algorithm design. Efficiency and simplicity are the main features of randomized algorithms that often made randomization a miraculous springboard for solving complex problems in various applications. Especially in the areas of communication, cryptography, data management, and discrete...

Applied Microsoft SQL Server 2008 Reporting Services
Applied Microsoft SQL Server 2008 Reporting Services

"This is a great resource for those who are looking to get the most out of the Microsoft reporting platform. Leveraging his lengthy experience with the product and close relationship with the development team at Microsoft, Teo provides an insider’s view of the product that goes beyond simple tutorials and screenshots. The book has a...

C in Depth
C in Depth
In the third edition of the book C in depth , the authors explain the basics of the programming language while maintaining the integrity and clarity of the programs. The book can be utilized by both beginners and advanced level programmers as a self-evaluation and learning source. There are more than 310 programs with explanations to illustrate...

ISO 20022 For Dummies®
ISO 20022 For Dummies®

The financial services industry has a unique opportunity. Despite all of the intricacies of our business processes and transaction types, our industry has the opportunity to identify and promote interoperable business processes that contain risk, reduce cost and deliver effective products and solutions. How can we achieve this? Through...

2019 Nelson's Pediatric Antimicrobial Therapy
2019 Nelson's Pediatric Antimicrobial Therapy
This best-selling and widely used resource on pediatric antimicrobial therapy provides instant access to reliable, up-to-the-minute recommendations for treatment of all infectious diseases in children.

For each disease, the authors provide a commentary to help health care providers select the best of all
...
Fodor's Boston (Full-color Travel Guide)
Fodor's Boston (Full-color Travel Guide)

For a limited time, receive a free Fodor's Guide to Safe and Healthy Travel e-book with the purchase of this guidebook! Go to fodors.com for details.

Whether you want to explore Boston Common, follow the Freedom Trail, or grab a cannoli in the North End, the local Fodor’s travel experts...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy