Part 3: Security, Compliance, and Databases
This part covers the best practices for cloud security, offering you a comprehensive toolkit to strengthen your defenses. We also cover encryption, a fundamental pillar of data protection. Additionally, you will discover the significance of identity and access management (IAM), secure API usage, network security, and secure coding practices for cloud-native applications. This part also explores the various database offerings available in the cloud. You can expect to learn about managed database services provided by major cloud providers.
This part has the following chapters:
- Chapter 6, Security and Compliance 1: Cloud Perspective
- Chapter 7, Security and Compliance 2: Cloud Perspective
- Chapter 8, Database Services – Part 1
- Chapter 9, Database Services – Part 2