March 4, 2024, 7:29 p.m. | Eyal Estrin

DEV Community dev.to

This post was originally published by the Cloud Security Alliance.


When organizations used to build legacy applications in the past, they used to align infrastructure and application layers to business requirements, reviewing hardware requirements and limitations, team knowledge, security, legal considerations, and more.


In this series of blog posts, we will review considerations when building today's cloud-native applications.


Readers of this series of blog posts can use the information shared, as a checklist to be embedded as part of …

alliance application applications architecture aws blog blog posts build business checklist cloud cloud-native cloud-native applications cloud security cloud security alliance design hardware infrastructure introduction knowledge legacy legal limitations organizations posts requirements security series team

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Data & Security Engineer Lead

@ LiquidX | Singapore, Central Singapore, Singapore

IT and Cyber Risk Control Lead

@ GXS Bank | Singapore - OneNorth

Consultant Senior en Gestion de Crise Cyber et Continuité d’Activité H/F

@ Hifield | Sèvres, France

Cyber Security Analyst (Weekend 1st Shift)

@ Fortress Security Risk Management | Cleveland, OH, United States

Senior Manager, Cybersecurity

@ BlueTriton Brands | Stamford, CT, US