Identity Security for Software Development cover art

Identity Security for Software Development

Best Practices That Every Developer Must Know

Preview

Audible Standard 30-day free trial

Try Standard free
Select 1 audiobook a month from our entire collection.
Listen to your selected audiobooks as long as you're a member.
Get unlimited access to bingeable podcasts.
Standard auto renews for £5.99 a month after 30 days. Cancel anytime.

Identity Security for Software Development

By: John Walsh, Uzi Ailon, Matt Barker
Narrated by: Tom Perkins
Try Standard free

£5.99 a month after 30 days. Cancel anytime.

Buy Now for £13.59

Buy Now for £13.59

LIMITED TIME OFFER | Get 3 months of Audible Standard for £0.99 a month

£5.99/mo thereafter - terms apply.

About this listen

Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy integrated in your code, infrastructure, and environments from day one can help.

In this practical book, authors John Walsh, Uzi Ailon, and Matt Barker provide conceptual frameworks, technology overviews, and useful code snippets to bridge the gap between development, IT, and security to integrate robust identity security across apps, CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, process automation, IoT, and more. You'll learn:

● What developers need to know about managing secrets and identity to build safer apps

● What machine identities, secrets, and credentials are—and how to secure them

● How to secure the software supply chain to build safer apps

● How identity security fits into modern software development practices

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2025 O'Reilly Media, Inc. (P)2025 Ascent Audio
Programming Programming & Software Development Security & Encryption Software Development Technology Software Computer Security
No reviews yet