
Securing Cloud Containers
Building and Running Secure Cloud-Native Applications
- 355 pages
- English
- PDF
- Available on iOS & Android
Securing Cloud Containers
Building and Running Secure Cloud-Native Applications
About this book
A practical and up-to-date roadmap to securing cloud containers on AWS, GCP, and Azure
Securing Cloud Containers: Building and Running Secure Cloud-Native Applications is a hands-on guide that shows you how to secure containerized applications and cloud infrastructure, including Kubernetes. The authors address the most common obstacles and pain points that security professionals, DevOps engineers, and IT architects encounter in the development of cloud applications, including industry standard compliance and adherence to security best practices.
The book provides step-by-step instructions on the strategies and tools you can use to develop secure containers, as well as real-world examples of secure cloud-native applications. After an introduction to containers and Kubernetes, you'll explore the architecture of containerized applications, best practices for container security, security automation tools, the use of artificial intelligence in cloud security, and more.
Inside the book:
- An in-depth discussion of implementing a Zero Trust model in cloud environments
- Additional resources, including a glossary of important cloud and container security terms, recommendations for further reading, and lists of useful platform-specific tools (for Azure, Amazon Web Services, and Google Cloud Platform)
- An introduction to SecDevOps in cloud-based containers, including tools and frameworks designed for Azure, GCP, and AWS platforms
An invaluable and practical resource for IT system administrators, cloud engineers, cybersecurity and SecDevOps professionals, and related IT and security practitioners, Securing Cloud Containers is an up-to-date and accurate roadmap to cloud container security that explains the "why" and "how" of securing containers on the AWS, GCP, and Azure platforms.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Title Page
- Copyright Page
- About the Authors
- About the Technical Editor
- Acknowledgments
- Contents at a Glance
- Contents
- Foreword
- Introduction
- Chapter 1 Introduction to Cloud-Based Containers
- Chapter 2 Cloud-Native Kubernetes: Azure, GCP, and AWS
- Chapter 3 Understanding the Threats Against Cloud-Based Containerized Environments
- Chapter 4 Secure Cloud Container Platform and Container Runtime
- Chapter 5 Secure Application Container Security in the Cloud
- Chapter 6 Secure Monitoring in Cloud-Based Containers
- Chapter 7 Kubernetes Orchestration Security
- Chapter 8 Zero Trust Model for Cloud Container Security
- Chapter 9 DevSecOps in Cloud-Based Container Platform
- Chapter 10 Application Modernization with Cloud Containers
- Chapter 11 Compliance and Governance in Cloud-Based Containers
- Chapter 12 Case Studies and Real-World Examples in Cloud Container Security
- Chapter 13 The Future of Cloud-Based Container Security
- Chapter 14 Security Automation and AI in Cloud Container Security
- Chapter 15 Cloud Container Platform Resiliency
- Appendix A Glossary of Cloud and Container Security Terms
- Appendix B Resources for Further Reading on Cloud-Based Containers
- Appendix C Cloud-Specific Tools and Platforms for Container Security
- Index
- EULA