Part 4: Data and Application Security Patterns
Data protection is a critical requirement when leveraging data and storage resources in multiple clouds. This part will cover patterns for protecting data at rest, in transit, and in use. Key management and certificate management are other key services used in the context of data protection. We will look at the emerging patterns of how these services can be leveraged effectively to allow enterprises to keep full control of their data in a shared responsibility model of cloud data protection. Threat modeling involves understanding the threats and attacks on an application that can lead to security incidents. Secure engineering ensures that products, applications, and services are built with strong security and privacy controls. Configuration and vulnerability management are other critical capabilities needed for security and compliance programs. This part discusses the automation aspects of how to shift left and integrate security in the...