March 12, 2024, 3:29 p.m. | Eyal Estrin

DEV Community dev.to

This post was originally published by the Cloud Security Alliance.


In Chapter 1 of this series about considerations when building cloud-native applications, we introduced various topics such as business requirements, infrastructure considerations, automation, resiliency, and more.


In this chapter, we will review security considerations when building cloud-native applications.





IAM Considerations - Authentication


Identity and Access Management plays a crucial role when designing new applications.


We need to ask ourselves – Who are our customers?


If we are building an …

alliance applications automation aws building business checklist cloud cloud-native cloud-native applications cloud security cloud security alliance design iam infrastructure requirements resiliency review security series topics

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior - Penetration Tester

@ Deloitte | Madrid, España

Associate Cyber Incident Responder

@ Highmark Health | PA, Working at Home - Pennsylvania

Senior Insider Threat Analyst

@ IT Concepts Inc. | Woodlawn, Maryland, United States