ensure continuous security, deployment, and delivery with DevSecOps /
نام نخستين پديدآور
Tony Hsu.
وضعیت نشر و پخش و غیره
محل نشرو پخش و غیره
Birmingham, UK :
نام ناشر، پخش کننده و غيره
Packt Publishing,
تاریخ نشرو بخش و غیره
2018.
مشخصات ظاهری
نام خاص و کميت اثر
1 online resource (1 volume) :
ساير جزييات
illustrations
یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر
متن يادداشت
Includes bibliographical references.
یادداشتهای مربوط به مندرجات
متن يادداشت
Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: DevSecOps Drivers and Challenges; Security compliance; ISO 27001; Cloud Security Alliance (CSA); Federal Information Processing Standards (FIPS); Center for Internet Security (CIS) and OpenSCAP -- securing your infrastructure; National Checklist Program (NCP) repository; OpenSCAP tools; Legal and security compliance; New technology (third-party, cloud, containers, and virtualization); Virtualization; Dockers; Infrastructure as Code (IaC); Cloud services hacks/abuse
متن يادداشت
Case study -- products on saleWhat do hackers do?; Rapid release; Summary; Questions; Further reading; Chapter 2: Security Goals and Metrics; Organization goal; Strategy and metrics; Policy and compliance; Education and guidance; Development goal/metrics; Threat assessment; Threat assessment for GDPR; Deliverables and development team self-assessment; Security requirements; QA goal/metrics; Design review; Implementation review; Third-party components; IDE-plugin code review; Static code review; Target code review; Security testing; Operation goal/metrics; Issue management
متن يادداشت
Environment HardeningSecure configuration baseline; Constant monitoring mechanism; Operational enablement; Code signing for application deployment; Application communication ports matrix; Application configurations; Summary; Questions; Further reading; Chapter 3: Security Assurance Program and Organization; Security assurance program; SDL (Security Development Lifecycle); OWASP SAMM; Security guidelines and processes; Security growth with business; Stage 1 -- basic security control; Stage 2 -- building a security testing team; Stage 3 -- SDL activities; Stage 4 -- self-build security services
متن يادداشت
Security requirements for big dataBig data security requirements; Big data technical security frameworks; Privacy requirements for GDPR; Privacy Impact Assessment (PIA); Privacy data attributes; Example of a data flow assessment; GDPR security requirements for data processor and controller; Summary; Questions; Further reading; Chapter 5: Case Study -- Security Assurance Program; Security assurance program case study; Microsoft SDL and SAMM; Security training and awareness; Security culture; Web security frameworks; Baking security into DevOps; Summary; Questions; Further reading
متن يادداشت
Stage 5 -- big data security analysis and automationRole of a security team in an organization; Security office under a CTO; Dedicated security team; Case study -- a matrix, functional, or taskforce structure; Security resource pool; Security technical committee (taskforce); Summary; Questions; Further reading; Chapter 4: Security Requirements and Compliance; Security requirements for the release gate; Release gate examples; Common Vulnerability Scoring System (CVSS); Security requirements for web applications; OWASP Application Security Verification Standard (ASVS); Security knowledge portal
بدون عنوان
0
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
Hands-On Security in DevOps explores how the techniques of DevOps and Security should be applied together to make cloud services safer. By the end of this book, readers will be ready to build security controls at all layers, monitor and respond to attacks on cloud services, and add security organization-wide through risk management and training.
یادداشتهای مربوط به سفارشات
منبع سفارش / آدرس اشتراک
OverDrive, Inc.
منبع سفارش / آدرس اشتراک
Safari Books Online
شماره انبار
99ECEB87-6778-4575-9D7E-C4E6F8CE644F
شماره انبار
CL0500000989
عنوان اصلی به زبان دیگر
عنوان اصلي به زبان ديگر
Hands-on security in Development Operations
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Computer networks-- Access control.
موضوع مستند نشده
Computer networks-- Security measures.
موضوع مستند نشده
Information technology-- Management.
موضوع مستند نشده
Computer networks-- Access control.
موضوع مستند نشده
Computer networks-- Security measures.
موضوع مستند نشده
COMPUTERS-- Security-- General.
موضوع مستند نشده
Information technology-- Management.
مقوله موضوعی
موضوع مستند نشده
COM-- 053000
رده بندی ديویی
شماره
005
.
8
ويراست
23
رده بندی کنگره
شماره رده
HD30
.
2
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )