Read more
In today's cloud native world, where we automate as much as possible, everything is code. With this practical guide, you'll learn how Policy as Code (PaC) provides the means to manage the policies, related data, and responses to events that occur within the systems we maintain--Kubernetes, cloud security, software supply chain security, infrastructure as code, and microservices authorization, among others. Author Jimmy Ray provides a practical approach to integrating PaC solutions into your systems, with plenty of real-world examples and important hands-on guidance. DevOps and DevSecOps engineers, Kubernetes developers, and cloud engineers will understand how to choose and then implement the most appropriate solutions.
- Understand PaC theory, best practices, and use cases for security
- Learn how to choose and use the correct PaC solution for your needs
- Explore PaC tooling and deployment options for writing and managing PaC policies
- Apply PaC to DevOps, IaC, Kubernetes, and AuthN/AuthZ
- Examine how you can use PaC to implement security controls
- Verify that your PaC solution is providing the desired result
- Create auditable artifacts to satisfy internal and external regulatory requirements
About the author
Jimmy Ray has over 25 years' experience in technology, specializing in cybersecurity, cloud architecture, containerization, and Policy as Code. His experience spans multiple industries, including aviation, finance, ecommerce, healthcare logistics, government, semiconductors, and cloud computing. Jimmy has been writing and speaking for over 20 years, and for the past several years he has focused on providing security, compliance, and governance solutions with Policy as Code (PaC) in the areas of cloud computing, containerization, and software supply chain. Jimmy is recognized as a subject matter expert in PaC and container supply chain security.
Summary
With this practical guide, you'll learn how Policy as Code (PaC) provides the means to manage the policies, related data, and responses to events that occur within the systems we maintain-Kubernetes, cloud security, software supply chain security, infrastructure as code, and microservices authorization, among others.