Useful Links
Computer Science
Cloud Computing
Cloud Application Development
1. Fundamentals of Cloud Computing
2. Cloud-Native Principles and Philosophy
3. Cloud Application Architectural Patterns
4. Core Development and Deployment Technologies
5. Utilizing Managed Cloud Services
6. Building and Releasing Cloud Applications
7. Observability and Monitoring
8. Security in Cloud Application Development
9. Cost Management and Optimization
Security in Cloud Application Development
Shared Responsibility Model
Provider Responsibilities
Customer Responsibilities
Security Boundaries
Identity and Access Management
Authentication Mechanisms
Multi-Factor Authentication
Single Sign-On
Identity Providers
Authorization Models
Role-Based Access Control
Attribute-Based Access Control
Policy-Based Access Control
Principle of Least Privilege
Access Reviews
Just-in-Time Access
Privilege Escalation Prevention
Application Security
Secure Development Lifecycle
Security by Design
Threat Modeling
Security Requirements
Code Security
Static Application Security Testing
Dynamic Application Security Testing
Interactive Application Security Testing
Dependency Management
Software Composition Analysis
Vulnerability Scanning
License Compliance
Secrets Management
Secret Storage
Secret Rotation
Access Control
Infrastructure Security
Network Security
Firewalls
Network Segmentation
VPN Connectivity
Compute Security
Instance Hardening
Patch Management
Runtime Protection
Container Security
Image Security
Runtime Security
Orchestration Security
Data Security
Encryption
Encryption in Transit
Encryption at Rest
Key Management
Data Classification
Sensitivity Levels
Handling Requirements
Retention Policies
Privacy Protection
Data Minimization
Consent Management
Compliance Requirements
Previous
7. Observability and Monitoring
Go to top
Next
9. Cost Management and Optimization