Jan. 28, 2023, 3:54 p.m. | Eyal Estrin

DEV Community dev.to

In chapter 1 of this series about cloud-native applications, we have introduced the key characteristics of cloud-native applications.


In this chapter, we will review how to secure cloud-native applications.





Securing the CI/CD pipeline


Due to the dynamic nature of the cloud-native application, we need to begin securing our application stack from the initial steps of the CI/CD pipeline.


Since I have already written posts on how to secure DevOps processes, automation, and supply chain, I will highlight the following:



  • Run …

application applications automation aws cd pipeline cicd cloud cloud-native cloudnative cloud-native applications devops dynamic key kubernetes nature pipeline processes review secure cloud security series supply the key

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Dir-Information Security - Cyber Analytics

@ Marriott International | Bethesda, MD, United States

Security Engineer - Security Operations

@ TravelPerk | Barcelona, Barcelona, Spain

Information Security Mgmt- Risk Assessor

@ JPMorgan Chase & Co. | Bengaluru, Karnataka, India

SAP CO Consultant

@ Atos | Istanbul, TR