๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Practical Cloud Native Security with Falco: Risk and Threat Detection for Containers, Kubernetes, and Cloud. Early Release

โœ Scribed by Loris Degioanni, Leonardo Grasso


Publisher
O'Reilly Media
Year
2022
Tongue
English
Leaves
220
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to approach software development and execution. In the meantime, security threats are growing more sophisticated and widespread every day. Protecting your applications from these threats requires the ability to defend them at runtime, when they're most vulnerable to attacks.

This practical guide introduces you to Falco, the open source standard for continuous risk and threat detection across Kubernetes, containers, and the cloud. Falco creator Loris Degioanni and core maintainer Leonardo Grasso bring you up to speed on cloud native threat detection basics and show you how to get Falco up and running. You'll then dive into advanced topics such as deploying Falco in production and writing your own security rules.

You'll learn how to:

  • Leverage runtime security in cloud native environments
  • Detect configuration changes and unexpected behavior in the cloud
  • Protect containers, Kubernetes, and cloud applications using Falco
  • Run, deploy, and customize Falco using advanced concepts
  • Deploy, configure, and maintain Falco in a production environment
  • Improve your organization's ability to pass compliance audits
  • Implement threat detection for containers, Kubernetes, and cloud apps

๐Ÿ“œ SIMILAR VOLUMES


Practical Cloud Native Security with Fal
โœ Loris Degioanni, Leonardo Grasso ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› O'Reilly Media ๐ŸŒ English

As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to approach software development and execution. Protecting modern, cloud native applications from threats requires the ability to defend them at runtime, when they're most vulne

Cloud Native with Kubernetes: Deploy, co
โœ Alexander Raul ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Packt Publishing ๐ŸŒ English

Kubernetes is a modern cloud native container orchestration tool and one of the most popular open source projects worldwide. In addition to the technology being powerful and highly flexible, Kubernetes engineers are in high demand across the industry. This book is a comprehensive guide to deployi

Cloud Native with Kubernetes: Deploy, co
โœ Alexander Raul ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Packt Publishing ๐ŸŒ English

Kubernetes is a modern cloud native container orchestration tool and one of the most popular open source projects worldwide. In addition to the technology being powerful and highly flexible, Kubernetes engineers are in high demand across the industry. This book is a comprehensive guide to deployi

Cloud Native with Kubernetes: Deploy, co
โœ Alexander Raul ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Packt Publishing ๐ŸŒ English

Kubernetes is a modern cloud native container orchestration tool and one of the most popular open source projects worldwide. In addition to the technology being powerful and highly flexible, Kubernetes engineers are in high demand across the industry. This book is a comprehensive guide to deployi

Kubernetes Security and Observability: A
โœ Brendan Creane ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› O'Reilly Media ๐ŸŒ English

<p>Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of considerations, from infrastructure choices and cluster configuration to deployment controls and runtime and network security. With this practical book, you'll learn how to adopt

Kubernetes Security and Observability: A
โœ Brendan Creane, Amit Gupta ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› O'Reilly Media ๐ŸŒ English

<p><span>Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of considerations, from infrastructure choices and cluster configuration to deployment controls and runtime and network security. With this practical book, you'll learn how to