Couverture de Identity Security for Software Development

Identity Security for Software Development

Best Practices That Every Developer Must Know

Aperçu

30 jours d'essai gratuit à Audible Standard

Essayer Standard gratuitement
Choisissez 1 livre audio par mois dans l'ensemble de notre catalogue.
Écoutez les livres audio que vous avez choisis pendant toute la durée de votre abonnement.
Accédez à volonté à des podcasts incontournables.
Gratuit avec l'offre d'essai, ensuite 2,99 €/mois. Possibilité de résilier l'abonnement chaque mois.

Identity Security for Software Development

De : John Walsh, Uzi Ailon, Matt Barker
Lu par : Tom Perkins
Essayer Standard gratuitement

Renouvellement automatique à 2,99 € mois après 30 jours. Annulation possible chaque mois.

Acheter pour 12,56 €

Acheter pour 12,56 €

À propos de ce contenu audio

Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy integrated in your code, infrastructure, and environments from day one can help.

In this practical book, authors John Walsh, Uzi Ailon, and Matt Barker provide conceptual frameworks, technology overviews, and useful code snippets to bridge the gap between development, IT, and security to integrate robust identity security across apps, CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, process automation, IoT, and more. You'll learn:

● What developers need to know about managing secrets and identity to build safer apps

● What machine identities, secrets, and credentials are—and how to secure them

● How to secure the software supply chain to build safer apps

● How identity security fits into modern software development practices

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2025 O'Reilly Media, Inc. (P)2025 Ascent Audio
Programmation et développement de logiciels Sécurité et cryptage
Aucun commentaire pour le moment