Cloud Application Development

  1. Security in Cloud Application Development
    1. Shared Responsibility Model
      1. Provider Responsibilities
        1. Customer Responsibilities
          1. Security Boundaries
          2. Identity and Access Management
            1. Authentication Mechanisms
              1. Multi-Factor Authentication
                1. Single Sign-On
                  1. Identity Providers
                  2. Authorization Models
                    1. Role-Based Access Control
                      1. Attribute-Based Access Control
                        1. Policy-Based Access Control
                        2. Principle of Least Privilege
                          1. Access Reviews
                            1. Just-in-Time Access
                              1. Privilege Escalation Prevention
                            2. Application Security
                              1. Secure Development Lifecycle
                                1. Security by Design
                                  1. Threat Modeling
                                    1. Security Requirements
                                    2. Code Security
                                      1. Static Application Security Testing
                                        1. Dynamic Application Security Testing
                                          1. Interactive Application Security Testing
                                          2. Dependency Management
                                            1. Software Composition Analysis
                                              1. Vulnerability Scanning
                                                1. License Compliance
                                                2. Secrets Management
                                                  1. Secret Storage
                                                    1. Secret Rotation
                                                      1. Access Control
                                                    2. Infrastructure Security
                                                      1. Network Security
                                                        1. Firewalls
                                                          1. Network Segmentation
                                                            1. VPN Connectivity
                                                            2. Compute Security
                                                              1. Instance Hardening
                                                                1. Patch Management
                                                                  1. Runtime Protection
                                                                  2. Container Security
                                                                    1. Image Security
                                                                      1. Runtime Security
                                                                        1. Orchestration Security
                                                                      2. Data Security
                                                                        1. Encryption
                                                                          1. Encryption in Transit
                                                                            1. Encryption at Rest
                                                                              1. Key Management
                                                                              2. Data Classification
                                                                                1. Sensitivity Levels
                                                                                  1. Handling Requirements
                                                                                    1. Retention Policies
                                                                                    2. Privacy Protection
                                                                                      1. Data Minimization
                                                                                        1. Compliance Requirements