Jan. 28, 2023, 3:54 p.m. | Eyal Estrin

DEV Community dev.to

In chapter 1 of this series about cloud-native applications, we have introduced the key characteristics of cloud-native applications.


In this chapter, we will review how to secure cloud-native applications.





Securing the CI/CD pipeline


Due to the dynamic nature of the cloud-native application, we need to begin securing our application stack from the initial steps of the CI/CD pipeline.


Since I have already written posts on how to secure DevOps processes, automation, and supply chain, I will highlight the following:



  • Run …

application applications automation aws cd pipeline cicd cloud cloud-native cloudnative cloud-native applications devops dynamic key kubernetes nature pipeline processes review secure cloud security series supply the key

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Consultant Sécurité SI Gouvernance - Risques - Conformité H/F - Strasbourg

@ Hifield | Strasbourg, France

Lead Security Specialist

@ KBR, Inc. | USA, Dallas, 8121 Lemmon Ave, Suite 550, Texas

Consultant SOC / CERT H/F

@ Hifield | Sèvres, France