March 12, 2024, 3:29 p.m. | Eyal Estrin

DEV Community dev.to

This post was originally published by the Cloud Security Alliance.


In Chapter 1 of this series about considerations when building cloud-native applications, we introduced various topics such as business requirements, infrastructure considerations, automation, resiliency, and more.


In this chapter, we will review security considerations when building cloud-native applications.





IAM Considerations - Authentication


Identity and Access Management plays a crucial role when designing new applications.


We need to ask ourselves – Who are our customers?


If we are building an …

alliance applications automation aws building business checklist cloud cloud-native cloud-native applications cloud security cloud security alliance design iam infrastructure requirements resiliency review security series topics

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior Security Researcher, SIEM

@ Huntress | Remote Canada

Senior Application Security Engineer

@ Revinate | San Francisco Bay Area

Cyber Security Manager

@ American Express Global Business Travel | United States - New York - Virtual Location

Incident Responder Intern

@ Bentley Systems | Remote, PA, US

SC2024-003533 Senior Online Vulnerability Assessment Analyst (CTS) - THU 9 May

@ EMW, Inc. | Mons, Wallonia, Belgium