Table of Contents
- Introduction to Cloud Native Applications
- Securing Modern Design Architectures
- Containers and Kubernetes for Cloud Native Applications
- Serverless for Cloud Native Applications
- Building Secure CI/CD Pipelines
- The 12-Factor Application Methodology
- Using Infrastructure as Code
- Authorization and Policy as Code
- Implementing Immutable Infrastructure
- Encryption and Secrets Management
- Threat Management in Cloud Native Applications
- Summary and Key Takeaways