Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

Security as Code

Rating
-
Sold
-
Pages
122
Uploaded on
28-09-2024
Written in
2024/2025

"Security as Code" is a hands-on guide to integrating security into the software development lifecycle. This book provides a comprehensive approach to writing secure code, automating security testing, and implementing DevSecOps practices. Chapter Overview: Chapter 1: Introduction to Security as Code (Pages 1-25) - Overview of Security as Code - Importance of Secure Software Development - DevSecOps Principles Chapter 2: Secure Coding Practices (Pages 26-55) - Secure Coding Techniques - Input Validation and Sanitization - Error Handling and Logging - Secure Data Storage Chapter 3: Threat Modeling and Risk Assessment (Pages 56-81) - Threat Modeling Methodologies - Risk Assessment and Mitigation - Secure Design Principles Chapter 4: Automated Security Testing (Pages 82-115) - Static Application Security Testing (SAST) - Dynamic Application Security Testing (DAST) - Interactive Application Security Testing (IAST) Chapter 5: DevSecOps Tools and Techniques (Pages 116-145) - Jenkins and GitLab Integration - Docker and Kubernetes Security - Continuous Integration and Delivery Chapter 6: Secure Deployment and Monitoring (Pages 146-175) - Secure Deployment Strategies - Monitoring and Incident Response - Compliance and Regulatory Requirements Chapter 7: Advanced Security Topics (Pages 176-199) - Artificial Intelligence/Machine Learning Security - Cloud Security and Containerization - IoT Security and Secure Coding Key Features: - Comprehensive guide to Security as Code - Hands-on examples and case studies - Covers DevSecOps, secure coding, and automated security testing - Includes threat modeling, risk assessment, and secure design principles - Discusses advanced security topics and emerging trends Target Audience: - Software Developers - DevOps Engineers - Security Professionals - IT Managers - Cybersecurity Students and Researchers Learning Outcomes: - Understand Security as Code principles - Implement secure coding practices - Automate security testing - Integrate DevSecOps tools and techniques - Deploy secure software systems

Show more Read less
Institution
Course

Content preview

Security
as Code
DevSecOps Patterns with AWS


Compliments of




BK Sarthak Das
& Virginia Chu

,Security as Code
DevOps engineers, developers, and security engineers have
ever-changing roles to play in today’s cloud native world. In “An excellent guide.
order to build secure and resilient applications, you have to
Security as Code takes
be equipped with security knowledge. Enter security as code.
you from abstract
In this book, authors BK Sarthak Das and Virginia Chu concept to the working
demonstrate how to use this methodology to secure technology, people, and
any application and infrastructure you want to deploy. processes. If you need to
With Security as Code, you’ll learn how to create a secure
actually do the work of
environment using CI/CD tooling from AWS and open source
shifting security left, this
providers. You’ll also see how a containerized application can
be deployed as infrastructure as code (IaC) within AWS.
book is for you.”
­—Fritz Kunstler
This practical guide also provides common patterns and Principal, AWS Global Services Security
methods to develop secure and resilient infrastructure.
• Learn the tools of the trade using Kubernetes and the AWS “The ultimate hands-on
Code Suite security guide for DevOps
roles, covering tooling
• Set up IaC and run scans to detect misconfigured resources
and processes.”
in your code
—Michael Hausenblas
• Create secure logging patterns with CloudWatch and Solution Engineering Lead, AWS
other tools
• Restrict system access to authorized users with role-based
access control (RBAC) BK Sarthak Das works at Google as a
security engineer and was previously
• Inject faults to test the resiliency of your application with at AWS as a senior security architect.
AWS Fault Injection Simulator or open source tooling
Virginia Chu is a principal DevSecOps
• Learn how to pull everything together into one deployment engineer at AWS who began her career
as a Linux system administrator and
developer.




SECURIT Y Twitter: @oreillymedia
linkedin.com/company/oreilly-media
US $55.99 CAN $69.99 youtube.com/oreillymedia
ISBN: 978-1-098-14277-3
978-1-098-12746-6




www.dbooks.org

, Automate Modern App and
API Security with Ease — Shift Left
with F5 NGINX App Protect
Move Fast, Secure Fast, Stay Agile
In today’s competitive landscape, being agile is more essential than ever before:
it helps you adapt quickly to the latest trends, stay ahead of competitors, and
better serve your customers. You no longer need to sacrifice security for agility.
DevOps can integrate security controls authorized by SecOps across distributed
environments without slowing app performance or release velocity.

Shifting security left is a key strategy for app development and deployment.
By automating application and API security in the early stages of your CI/CD pipeline,
you can build more reliable apps, reduce the cost of a breach by up to 80%, and
accelerate your time to market, keeping you one step ahead of the competition.

NGINX App Protect is a lightweight, high-performance, modern application security
solution that integrates seamlessly into DevOps environments as a WAF or app-level
DoS defense, helping your enterprise shift security left and deliver secure apps
for easy DevSecOps.




Delivers advanced WAF Integrates easily into the CI/CD
security beyond basic tool chain; infrastructure agnostic
OWASP Top 10 protection



Facilitates declarative policies Protects against DoS attacks at
for “security as code” enabling both Layers 4 and 7
enterprises to shift security left




Download a 30-day free trial today at:
nginx.com/free-trial-request/


©2022 F5, Inc. All rights reserved. F5, the F5 logo, F5 NGINX, the NGINX logo, and F5 NGINX App Protect are trademarks of F5, Inc. in the U.S. and in certain other countries. Other F5
trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation,
expressed or implied, claimed by F5, Inc.

, Security as Code
DevSecOps Patterns with AWS




BK Sarthak Das and Virginia Chu




Beijing Boston Farnham Sebastopol Tokyo


www.dbooks.org

Written for

Institution
Course

Document information

Uploaded on
September 28, 2024
Number of pages
122
Written in
2024/2025
Type
Class notes
Professor(s)
Prof. justin seitz
Contains
All classes

Subjects

$5.19
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
muhammadmuneeb2

Get to know the seller

Seller avatar
muhammadmuneeb2 virtual
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
1 year
Number of followers
0
Documents
9
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions