Identity Security for Software Development cover art

Identity Security for Software Development

Best Practices That Every Developer Must Know

LIMITED TIME OFFER

3 months free
Pre-order: Try for £0.00
£8.99/mo thereafter. Renews automatically. Terms apply. Offer ends 31 July 2025 at 23:59 GMT.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for £8.99/mo after 3 months. Cancel monthly.

Identity Security for Software Development

By: John Walsh, Uzi Ailon, Matt Barker
Narrated by: Tom Perkins
Pre-order: Try for £0.00

£8.99/mo after 3 months. Offer ends 31 July 2025 23:59 GMT. Cancel monthly.

Pre-order Now for £12.99

Pre-order Now for £12.99

Confirm Pre-order
Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.
Cancel

About this listen

Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy integrated in your code, infrastructure, and environments from day one can help.

In this practical book, authors John Walsh, Uzi Ailon, and Matt Barker provide conceptual frameworks, technology overviews, and useful code snippets to bridge the gap between development, IT, and security to integrate robust identity security across apps, CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, process automation, IoT, and more. You'll learn:

● What developers need to know about managing secrets and identity to build safer apps

● What machine identities, secrets, and credentials are—and how to secure them

● How to secure the software supply chain to build safer apps

● How identity security fits into modern software development practices

©2025 O'Reilly Media, Inc. (P)2025 Ascent Audio
Programming Programming & Software Development Security & Encryption Software Development
No reviews yet