Identitynative Infrastructure Access Management: Preventing Breaches By Eliminating Secrets And Adopting Zero Trust,New

Identitynative Infrastructure Access Management: Preventing Breaches By Eliminating Secrets And Adopting Zero Trust,New

In Stock
SKU: DADAX1098131894
Brand: Oreilly & Associates Inc
Sale price$42.94 Regular price$61.34
Save $18.40
Quantity
Add to wishlist
Add to compare

Processing time: 1-3 days

US Orders Ships in: 3-5 days

International Orders Ships in: 8-12 days

Return Policy: 15-days return on defective items

Payment Option
Payment Methods

Help

If you have any questions, you are always welcome to contact us. We'll get back to you as soon as possible, withing 24 hours on weekdays.

Customer service

All questions about your order, return and delivery must be sent to our customer service team by e-mail at yourstore@yourdomain.com

Sale & Press

If you are interested in selling our products, need more information about our brand or wish to make a collaboration, please contact us at press@yourdomain.com

Traditional secretbased credentials can't scale to meet the complexity and size of cloud and onpremises infrastructure. Today's applications are spread across a diverse range of clouds and colocation facilities, as well as onprem data centers. Each layer of this modern stack has its own attack vectors and protocols to consider.How can you secure access to diverse infrastructure components, from bare metal to ephemeral containers, consistently and simply? In this practical book, authors Ev Kontsevoy, Sakshyam Shah, and Peter Conrad break this topic down into manageable pieces. You'll discover how different parts of the approach fit together in a way that enables engineering teams to build more secure applications without slowing down productivity.With this book, you'll learn: The four pillars of access: connectivity, authentication, authorization, and audit Why every attack follows the same pattern, and how to make this threat impossible How to implement identitybased access across your entire infrastructure with digital certificates Why it's time for secretbased credentials to go away How to securely connect to remote resources including servers, databases, K8s Pods, and internal applications such as Jenkins and GitLab Authentication and authorization methods for gaining access to and permission for using protected resources

⚠️ WARNING (California Proposition 65):

This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.

For more information, please visit www.P65Warnings.ca.gov.

Recently Viewed