From the course: Cloud Data, Platform, and Applications Security by Pearson
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Common software vulnerabilities
From the course: Cloud Data, Platform, and Applications Security by Pearson
Common software vulnerabilities
There's hazards to cloud development and cloud deployment. Remember, not all applications are ready for the cloud. They're not all enabled for virtualization. What do I mean by that? Well, if they're not virtual aware or cloud aware, they can have a tendency to use more resources on the underlying guest than they should. So for example, if you write a custom antivirus program or an off-the-shelf antivirus program. Developers also often fail to encrypt data at rest and data in transit, especially when using code repositories. Cloud development involves additional due diligence performed in the initial phases of the development lifecycle. So for example, the decision to use platform as a service or to use a particular development process, like Agile or CICD, is often rushed when using cloud deployment, but you shouldn't. Remember, you're saving money. You have cost savings in the cloud, so take your time in the early initiation phase. Also remember that on-premise doesn't always…
Contents
-
-
-
-
-
-
-
-
(Locked)
Module introduction1m 25s
-
(Locked)
Learning objectives32s
-
(Locked)
Cloud application architecture elements10m 1s
-
(Locked)
Cloud development6m 9s
-
(Locked)
SDLC business requirements and phases8m 56s
-
(Locked)
Common software vulnerabilities5m 55s
-
(Locked)
Software threat modeling methods8m 53s
-
(Locked)
Secure coding methodologies5m 48s
-
(Locked)
Software configuration management and versioning4m 46s
-
(Locked)
-
-
-