Identity-Native Infrastructure Access Management: Preventing Breaches by Eliminating Secrets and Adopting Zero Trust
Identity-Native Infrastructure Access Management: Preventing Breaches by Eliminating Secrets and Adopting Zero Trust
YOU SAVE £11.47
- Condition: Brand new
- UK Delivery times: Usually arrives within 2 - 3 working days
- UK Shipping: Fee starts at £2.39. Subject to product weight & dimension
- More about Identity-Native Infrastructure Access Management: Preventing Breaches by Eliminating Secrets and Adopting Zero Trust
Traditional secret-based credentials cannot scale to meet the complexity and size of cloud and on-premises infrastructure. This book provides a practical approach to securing access to diverse infrastructure components, from bare metal to ephemeral containers, consistently and simply. It explains the four pillars of access, why every attack follows the same pattern, and how to implement identity-based access across your entire infrastructure with digital certificates. It also highlights the need for secret-based credentials to go away and provides authentication and authorization methods for gaining access to and permission for using protected resources.
Format: Paperback / softback
Length: 154 pages
Publication date: 29 September 2023
Publisher: O'Reilly Media
Traditional secret-based credentials are insufficient to meet the complexity and size of modern cloud and on-premises infrastructure. Today's applications are distributed across various clouds, colocation facilities, and on-prem data centers, each with its own set of attack vectors and protocols. Securing access to diverse infrastructure components, ranging from bare metal to ephemeral containers, consistently and simply is a challenge.
In their practical book, authors Ev Kontsevoy, Sakshyam Shah, and Peter Conrad break down this topic into manageable sections. They explore how different parts of the approach fit together, enabling engineering teams to build more secure applications without compromising productivity.
The book covers the four pillars of access: connectivity, authentication, authorization, and audit. It explains why every attack follows a predictable pattern and how to make it impossible. It also provides guidance on implementing identity-based access across your entire infrastructure using digital certificates.
The authors argue that secret-based credentials are outdated and should be replaced with more secure methods. They discuss various authentication and authorization methods for gaining access to protected resources, including servers, databases, Kubernetes Pods, and internal applications such as Jenkins and GitLab.
By leveraging the principles outlined in this book, organizations can enhance their security posture and protect their valuable assets from cyber threats. The book is a valuable resource for IT professionals, security experts, and anyone interested in improving the security of their infrastructure.
Weight: 284g
Dimension: 235 x 178 x 9 (mm)
ISBN-13: 9781098131890
This item can be found in:
UK and International shipping information
UK and International shipping information
UK Delivery and returns information:
- Delivery within 2 - 3 days when ordering in the UK.
- Shipping fee for UK customers from £2.39. Fully tracked shipping service available.
- Returns policy: Return within 30 days of receipt for full refund.
International deliveries:
Shulph Ink now ships to Australia, Belgium, Canada, France, Germany, Ireland, Italy, India, Luxembourg Saudi Arabia, Singapore, Spain, Netherlands, New Zealand, United Arab Emirates, United States of America.
- Delivery times: within 5 - 10 days for international orders.
- Shipping fee: charges vary for overseas orders. Only tracked services are available for most international orders. Some countries have untracked shipping options.
- Customs charges: If ordering to addresses outside the United Kingdom, you may or may not incur additional customs and duties fees during local delivery.