The AWS Shared Responsibility Model AWS uses a shared responsibility model to define the remit of application security consumers and ...
The AWS Shared Responsibility Model AWS uses a shared responsibility model to define the remit of application security consumers and ...
Meet the OWASP Top 10 Cybersecurity is an incredibly well-researched area, with security professionals con‐ stantly assessing the ever-changing software ...
Serverless Threat Modeling Before designing a comprehensive security strategy for any serverless application, it is crucial to understand the attack ...
A process for threat modeling As preparation for your threat modeling sessions, you may find it conducive to productive meetings ...
Securing the Dependency Supply Chain Open source software is an incredible enabler of rapid software development and delivery. As a ...
Scan packages for vulnerabilities You should also run continuous vulnerability scans in response to new packages, package upgrades, and reports ...
Going Further with SLSA The SLSA security framework (pronounced salsa, short for Supply chain Levels for Software Artifacts) is “a ...
Protecting Serverless APIs According to the OWASP Top 10 list we looked at earlier in this chapter, the number one ...
Securing REST APIs with Amazon Cognito There are of course many access management services and identity providers avail‐ able, including ...