Book description
Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What can we do to improve our systems' resilience?
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering. By preparing for adverse events, you can ensure they don't disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.
- Learn how to design a modern security program
- Make informed decisions at each phase of software delivery to nurture resilience and adaptive capacity
- Understand the complex systems dynamics upon which resilience outcomes depend
- Navigate technical and organizational trade-offsthat distort decision making in systems
- Explore chaos experimentation to verify critical assumptions about software quality and security
- Learn how major enterprises leverage security chaos engineering
Publisher resources
Table of contents
- Preface
- 1. Resilience in Software and Systems
- 2. Systems-Oriented Security
- 3. Architecting and Designing
-
4. Building and Delivering
- Mental Models When Developing Software
- Who Owns Application Security (and Resilience)?
- Decisions on Critical Functionality Before Building
- Developing and Delivering to Expand Safety Boundaries
- Observe System Interactions Across Space-Time (or Make More Linear)
- Fostering Feedback Loops and Learning During Build and Deliver
- Flexibility and Willingness to Change
- Chapter Takeaways
- 5. Operating and Observing
- 6. Responding and Recovering
-
7. Platform Resilience Engineering
- Production Pressures and How They Influence System Behavior
- What Is Platform Engineering?
- Defining a Vision
- Defining a User Problem
-
Designing a Solution
- The Ice Cream Cone Hierarchy of Security Solutions
- System Design and Redesign to Eliminate Hazards
- Substitute Less Hazardous Methods or Materials
- Incorporate Safety Devices and Guards
- Provide Warning and Awareness Systems
- Apply Administrative Controls Including Guidelines and Training
- Two Paths: The Control Strategy or the Resilience Strategy
- Experimentation and Feedback Loops for Solution Design
- Implementing a Solution
- Chapter Takeaways
-
8. Security Chaos Experiments
- Lessons Learned from Early Adopters
- Setting Experiments Up for Success
- Designing a Hypothesis
- Designing an Experiment
- Experiment Design Specifications
- Conducting Experiments
- Analyzing and Documenting Evidence
- Automating Experiments
- Easing into Chaos: Game Days
- Example Security Chaos Experiments
- Chapter Takeaways
-
9. Security Chaos Engineering in the Wild
- Experience Report: The Existence of Order Through Chaos (UnitedHealth Group)
- Experience Report: A Quest for Stronger Reliability (Verizon)
- Experience Report: Security Monitoring (OpenDoor)
- Experience Report: Applied Security (Cardinal Health)
- Experience Report: Balancing Reliability and Security via SCE (Accenture Global)
- Experience Report: Cyber Chaos Engineering (Capital One)
- Chapter Takeaways
- Index
- About the Authors
Product information
- Title: Security Chaos Engineering
- Author(s):
- Release date: March 2023
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098113827
You might also like
book
Security Chaos Engineering
Information security is broken. Users and customers continually entrust companies with vital information, and companies continually …
book
Security Engineering, 3rd Edition
Now that there’s software in everything, how can you make anything secure? Understand how to engineer …
book
Security in Computing, 6th Edition
The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to …
book
Practical Cloud Security, 2nd Edition
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. …