UsefulLinks
Computer Science
Cloud Computing
Cloud Application Development
1. Fundamentals of Cloud Computing
2. Cloud-Native Principles and Philosophy
3. Cloud Application Architectural Patterns
4. Core Development and Deployment Technologies
5. Utilizing Managed Cloud Services
6. Building and Releasing Cloud Applications
7. Observability and Monitoring
8. Security in Cloud Application Development
9. Cost Management and Optimization
8.
Security in Cloud Application Development
8.1.
Shared Responsibility Model
8.1.1.
Provider Responsibilities
8.1.2.
Customer Responsibilities
8.1.3.
Security Boundaries
8.2.
Identity and Access Management
8.2.1.
Authentication Mechanisms
8.2.1.1.
Multi-Factor Authentication
8.2.1.2.
Single Sign-On
8.2.1.3.
Identity Providers
8.2.2.
Authorization Models
8.2.2.1.
Role-Based Access Control
8.2.2.2.
Attribute-Based Access Control
8.2.2.3.
Policy-Based Access Control
8.2.3.
Principle of Least Privilege
8.2.3.1.
Access Reviews
8.2.3.2.
Just-in-Time Access
8.2.3.3.
Privilege Escalation Prevention
8.3.
Application Security
8.3.1.
Secure Development Lifecycle
8.3.1.1.
Security by Design
8.3.1.2.
Threat Modeling
8.3.1.3.
Security Requirements
8.3.2.
Code Security
8.3.2.1.
Static Application Security Testing
8.3.2.2.
Dynamic Application Security Testing
8.3.2.3.
Interactive Application Security Testing
8.3.3.
Dependency Management
8.3.3.1.
Software Composition Analysis
8.3.3.2.
Vulnerability Scanning
8.3.3.3.
License Compliance
8.3.4.
Secrets Management
8.3.4.1.
Secret Storage
8.3.4.2.
Secret Rotation
8.3.4.3.
Access Control
8.4.
Infrastructure Security
8.4.1.
Network Security
8.4.1.1.
Firewalls
8.4.1.2.
Network Segmentation
8.4.1.3.
VPN Connectivity
8.4.2.
Compute Security
8.4.2.1.
Instance Hardening
8.4.2.2.
Patch Management
8.4.2.3.
Runtime Protection
8.4.3.
Container Security
8.4.3.1.
Image Security
8.4.3.2.
Runtime Security
8.4.3.3.
Orchestration Security
8.5.
Data Security
8.5.1.
Encryption
8.5.1.1.
Encryption in Transit
8.5.1.2.
Encryption at Rest
8.5.1.3.
Key Management
8.5.2.
Data Classification
8.5.2.1.
Sensitivity Levels
8.5.2.2.
Handling Requirements
8.5.2.3.
Retention Policies
8.5.3.
Privacy Protection
8.5.3.1.
Data Minimization
8.5.3.2.
Consent Management
8.5.3.3.
Compliance Requirements
Previous
7. Observability and Monitoring
Go to top
Next
9. Cost Management and Optimization