Identity Security for Software Development: Best Practices That Every Developer Must Know
暫譯: 軟體開發中的身份安全:每位開發者必知的最佳實踐
Walsh, John, Ailon, Uzi, Barker, Matt
相關主題
商品描述
Maintaining secrets, credentials, and nonhuman identities in secure ways is an important, though often overlooked, aspect of secure software development. Cloud migration and digital transformation have led to an explosion of nonhuman identities--like automation scripts, cloud native apps, and DevOps tools--that need to be secured across multiple cloud and hybrid environments.
DevOps security often addresses vulnerability scanning, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy focused on secrets management can help.
In this practical book, authors John Walsh and Uzi Ailon provide conceptual frameworks, technology overviews, and practical code snippets to help DevSecOps engineers, cybersecurity engineers, security managers, and software developers address use cases across CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, automation/RPA, IOT/OT, and more. You'll learn:
- The fundamentals of authentication, authorization, access control, and secrets management
- What developers need to know about managing secrets and identity to build safer apps
- What nonhuman identities, secrets, and credentials are--and how to secure them
- How developers work with their cross-function peers to build safer apps
- How identity security fits into modern software development practices
商品描述(中文翻譯)
維護秘密、憑證和非人類身份的安全方式是安全軟體開發中一個重要但常被忽視的方面。雲端遷移和數位轉型導致非人類身份的激增,例如自動化腳本、雲原生應用程式和 DevOps 工具,這些都需要在多個雲端和混合環境中進行安全保護。
DevOps 安全通常會處理漏洞掃描,但卻忽略了更廣泛的討論,例如身份驗證、授權和存取控制,這可能會留下安全漏洞的隱患。這就是專注於秘密管理的身份安全策略可以發揮作用的地方。
在這本實用的書中,作者 John Walsh 和 Uzi Ailon 提供了概念框架、技術概述和實用的程式碼片段,以幫助 DevSecOps 工程師、網路安全工程師、安全經理和軟體開發人員解決 CI/CD 管道、Kubernetes 和雲原生、混合和多雲、自動化/RPA、物聯網/運營技術等多種使用案例。您將學到:
- 身份驗證、授權、存取控制和秘密管理的基本原則
- 開發人員在管理秘密和身份以建立更安全的應用程式時需要了解的內容
- 什麼是非人類身份、秘密和憑證,以及如何保護它們
- 開發人員如何與跨功能同事合作以建立更安全的應用程式
- 身份安全如何融入現代軟體開發實踐