{"id":1968,"date":"2023-10-08T03:07:00","date_gmt":"2023-10-08T03:07:00","guid":{"rendered":"https:\/\/thecloudmarathoner.com\/?p=1968"},"modified":"2023-10-25T15:10:19","modified_gmt":"2023-10-25T15:10:19","slug":"book-review-what-you-need-to-know-about-cloud-native-software-%f0%9f%94%90-security-handbook-%e2%81%89-%f0%9f%a4%94","status":"publish","type":"post","link":"https:\/\/thecloudmarathoner.com\/index.php\/2023\/10\/08\/book-review-what-you-need-to-know-about-cloud-native-software-%f0%9f%94%90-security-handbook-%e2%81%89-%f0%9f%a4%94\/","title":{"rendered":"[Book Review] What you need to know about Cloud Native Software \ud83d\udd10 Security Handbook \u2049 \ud83e\udd14"},"content":{"rendered":"\n<p>Hello, Cloud Marathoners!<\/p>\n\n\n\n<p>A couple of days ago, I received a book from&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/packt-publishing\/\">Packt<\/a>&nbsp;&#8211; &#8220;Cloud Native Software Security Handbook&#8221;, authored by&nbsp;<a href=\"https:\/\/www.linkedin.com\/in\/ACoAACj4pcgBp1rq6lT643Gbfu4WRv0ePtvA6bQ\">Mihir Shah<\/a>&nbsp;and in this post, I will review and share my observations and impressions with the&nbsp;<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=cloud&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7118335719680401409\">#cloud<\/a><a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=community&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7118335719680401409\">#community<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"742\" src=\"\/wp-content\/uploads\/2023\/10\/image-1.png\" alt=\"\" class=\"wp-image-1969\" srcset=\"\/wp-content\/uploads\/2023\/10\/image-1.png 800w, \/wp-content\/uploads\/2023\/10\/image-1-300x278.png 300w, \/wp-content\/uploads\/2023\/10\/image-1-768x712.png 768w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/figure>\n\n\n\n<p>This book starts covering the Foundations of Cloud Native by exploring the tools and platforms offered by CNCF while providing a high-level stage for the rest of the book. Subsequently, the author dives into explaining AppSec culture and how to approach security implementation in cloud-native environments primarily using toolings like K8S, Calico, K9s, Falco, OPA Gateway, and others which I will be mentioning below.<\/p>\n\n\n\n<p>I liked the Cloud Security Operation chapter where open-source tooling sets like Elasticsearch, Fluentd, Kibana, Prometheus, Helm, and K8S have been used to streamline security operations with automation playbooks to minimize human interventions&nbsp;and errors.<\/p>\n\n\n\n<p>In addition, this book covers&nbsp;legal, compliance, and vendor management aspects of cloud-native&nbsp;software security by emphasizing its hidden cost and importance as important as mastering technical skills.<\/p>\n\n\n\n<p>This book also provides code samples, available for online access which is a big plus.<br><br>My suggestion would be the addition of more advanced use cases and code samples in the second edition of this book.<\/p>\n\n\n\n<p>Did you read any related book recently that made an impact on you\u2753<br>Please, share your feedback in the comments \ud83d\udcac<\/p>\n\n\n\n<p>Please, check my\u00a0<a href=\"https:\/\/www.linkedin.com\/posts\/elkhanyusubov_cloud-community-sharingiscaring-activity-7118335719680401409-wxfO\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn post<\/a>\u00a0to share your feedback. Thanks!<\/p>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_1968\" class=\"pvc_stats all  \" data-element-id=\"1968\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Hello, Cloud Marathoners! A couple of days ago, I received a book from&nbsp;Packt&nbsp;&#8211; &#8220;Cloud Native Software Security Handbook&#8221;, authored by&nbsp;Mihir Shah&nbsp;and in this post, I will review and share my observations and impressions with the&nbsp;#cloud#community. This book starts covering the Foundations of Cloud Native by exploring the tools and platforms offered by CNCF while providing &hellip; <a href=\"https:\/\/thecloudmarathoner.com\/index.php\/2023\/10\/08\/book-review-what-you-need-to-know-about-cloud-native-software-%f0%9f%94%90-security-handbook-%e2%81%89-%f0%9f%a4%94\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;[Book Review] What you need to know about Cloud Native Software \ud83d\udd10 Security Handbook \u2049 \ud83e\udd14&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[56,39,15],"tags":[],"class_list":["post-1968","post","type-post","status-publish","format-standard","hentry","category-book-review","category-information-protection","category-security-governance"],"_links":{"self":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/1968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/comments?post=1968"}],"version-history":[{"count":4,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/1968\/revisions"}],"predecessor-version":[{"id":1973,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/1968\/revisions\/1973"}],"wp:attachment":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/media?parent=1968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/categories?post=1968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/tags?post=1968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}