Learn how to safely transition from on-premises infrastructures to microservices and cloud-based environments.
Microservices and cloud-based environments can improve development and deployment processes, provide better scalability, and be more cost-effective compared to traditional on-premises infrastructures. However, when necessary precautions are not implemented, these infrastructures can also raise security challenges that could inadvertently put systems and businesses at an increased risk of cyber attacks.
This training module discusses methods that are often used to make a cloud-based architecture secure by design. The module’s content is designed to be technology-agnostic, but can be customized to include tech-specific recommendations.
Topics covered in this training module include:
Common cyber security threats
Cyber security threats for cloud-based environments
Threats from third-party services
OS based threats
Integration of secure development methods
Cryptography and encrypted communication
Access and privilege management
Authorization and authentication mechanisms
Service and asset isolation
Asset management
Secure storage of certificates, passwords, and other sensitive data