Book description
As countless breaches have proved, application security is no longer optional. But most established and trusted app sec tools were developed 10–15 years ago for a different world of software development. The next generation of software brings a different set of risks that requires new processes to manage. This report examines the security implications involved in next-generation software, from the code itself to the methodologies by which it’s developed and the infrastructure surrounding its use.
Cindy Blake shows you what this new software landscape looks like, covering new and evolving development technologies, tools, and frameworks and why they’re relevant to security. CISOs will see why cloud native and serverless architectures (for building software) and DevOps and Agile methodologies (for managing it) are critical areas for application security as they learn the 10 steps for securing next-generation software.
- Discover the DevOps principles that CISOs often overlook
- Explore three critical shifts of next-gen software and how they impact security
- Dive into a next-gen application security program
- Get practical advice for securing next generation software
Table of contents
- Foreword
-
10 Steps Every CISO Should Take to Secure Next-Gen Software
- Context: DevOps Principles That CISOs Often Overlook
- Three Critical Shifts of Next-Generation Software and How They Affect Security
- Shift 1: How Software Is Composed and Executed
- Shift 2: How Software Is Delivered and Managed
- Shift 3: How Software Complies with Regulatory Requirements
- What Lies Ahead for DevOps
- Defining the Next-Generation Application Security Program
-
Practical Advice for Securing Next-Generation Software
- Get in Front of the Change: “You Are Here”
- Rethink Security as an Outcome, Not a Department
- Start with the Process: Use Tools to Enable Change
- Solve for Obvious Cases: Breadth over Depth
- Unite the Workflow of Development and Security
- Monitor and Protect Applications in Production
- Align with Development Objectives
- Secure the SDLC
- Conclusion
Product information
- Title: 10 Steps Every CISO Should Take to Secure Next-Gen Software
- Author(s):
- Release date: November 2019
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781492082903
You might also like
book
Cyber Security: Essential Principles to Secure Your Organisation
Cyber Security – Essential principles to secure your organisation takes you through the fundamentals of cyber …
book
Inside the Security Mind: Making the Tough Decisions
"This is a really good book ... it spells out the motherhood and apple pie of …
book
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Leverage existing free open source software to build an identity and access management (IAM) platform that …
book
Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT
Discover high-value Azure security insights, tips, and operational optimizations Master powerful techniques and approaches for securing …