ODBIERZ TWÓJ BONUS :: »

Identity Security for Software Development Aiyan Ma

(ebook) (audiobook) (audiobook) Język publikacji: angielski
Identity Security for Software Development Aiyan Ma - okladka książki

Identity Security for Software Development Aiyan Ma - okladka książki

Identity Security for Software Development Aiyan Ma - audiobook MP3

Identity Security for Software Development Aiyan Ma - audiobook CD

Autor:
Aiyan Ma
Ocena:
Bądź pierwszym, który oceni tę książkę
Stron:
300
Dostępne formaty:
     ePub
     Mobi
Description
As modern infrastructures become increasingly automated, non-human identities, such as service accounts, API tokens, and automation agents, are emerging as critical security assets. Securing these identities is essential to protecting cloud-native environments, automated workflows, and machine-to-machine interactions from breaches, data leaks, and abuse.

This book provides a comprehensive guide to securing NHIs through practical strategies and hands-on demonstrations. Readers will explore the evolution of NHI security, from early machine-to-machine protocols to modern Zero Trust frameworks. Key topics include designing secure service accounts, managing API tokens and certificates, implementing secrets management with tools like HashiCorp Vault, SPRIE, and applying robust security controls such as encryption, access control, monitoring, ZTA, testing, automation, and centralization. To reinforce these concepts, the book presents a hands-on proof of concept (PoC) that demonstrates secure NHI management in an MCP system. Readers will gain insights into automating identity provisioning, ensuring credential hygiene, and integrating security best practices.

By the end of this book, readers will be equipped with the knowledge and skills to build resilient, security-first environments that protect NHIs across dynamic infrastructures.

What you will learn
Understand the evolution of NHI and best practices for securing service accounts, API tokens, and certificates.
Implement secure credential storage, rotation, and access control using HashiCorp Vault and Kubernetes Secrets.
Practical strategies for enforcing Zero Trust Architecture, rate limiting, and allow/block lists to mitigate unauthorized access and abuse.
Build a functional MCP system that integrates secure identity management, credential hygiene, and automated workflows.
Explore future-ready strategies like AI-driven threat detection, quantum-resistant algorithms, and dynamic authentication models to secure evolving infrastructures.

Who this book is for
This book targets intermediate to advanced practitioners, security professionals, engineering teams, and technical leadership who must have foundational knowledge of cloud-native, API-driven, and automated infrastructure concepts.

Table of Contents
1. History of Non-human Identities Security
2. Introduction to Non-human Identities
3. NHI Security Landscape
4. Identity of NHI
5. Credential Management
6. Security Controls
7. Automation and Orchestration
8. Build a Secure MCP System
9. Building Security Culture by Coding
10. Emerging Trends in NHI Security

Wybrane bestsellery

BPB Publications - inne książki

Zamknij

Przenieś na półkę
Dodano produkt na półkę
Usunięto produkt z półki
Przeniesiono produkt do archiwum
Przeniesiono produkt do biblioteki
Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności

Ebook
89,91 zł
Dodaj do koszyka
Zamknij Pobierz aplikację mobilną Ebookpoint