Serverless security : understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloud /

Apply the basics of security in serverless computing to new or existing projects. This hands-on guide provides practical examples and fundamentals. You will apply these fundamentals in all aspects of serverless computing: improving the code, securing the application, and protecting the infrastructur...

Full description

Saved in:
Bibliographic Details
Main Author: Calles, Miguel A. (Author)
Format: eBook
Published: [Berkeley, CA] : Apress, [2020]
Online Access:CONNECT
Table of Contents:
  • Chapter 1: Introduction to Cloud Computing Security
  • Chapter 2: Performing a Risk Assessment
  • Chapter 3: Securing the Code
  • Chapter 4: Securing Interfaces
  • Chapter 5: Configuring the Application Stack
  • Chapter 6: Restricting Permissions
  • Part IV: Monitoring and Alerting
  • Chapter 7: Account Management
  • Chapter 8: Secrets Management
  • Chapter 9: Authentication and Authorization
  • Chapter 10: Monitoring Security Events
  • Chapter 10: Protecting Sensitive Data
  • Chapter 11: Monitoring, Auditing, and Alerting
  • Chapter 12: Additional Considerations
  • Chapter 13: Finalizing the Risk Assessment.
  • Appendix A: List of Acronyms
  • Appendix B: Set Up Instructions
  • Appendix C: Exercises Review.