Policy as Code

Regular price €76.99
Quantity:
Delivery/Collection within 10-20 working days
Shipping & Delivery
A01=Jimmy Ray
Age Group_Uncategorized
Age Group_Uncategorized
Author_Jimmy Ray
automatic-update
Category1=Non-Fiction
Category=UMW
Category=UMZT
Category=UR
Category=UTC
COP=United States
Delivery_Pre-order
eq_bestseller
eq_computing
eq_isMigrated=2
eq_nobargain
eq_non-fiction
Language_English
PA=Not yet available
Policy policy-as-code PAC policy management security compliance and governance Open Policy Agent (OPA) Kubernetes Gatekeeper Kyverno DevOps DevSecOps everything-as-code infrastructure-as-code
Price_€50 to €100
PS=Forthcoming
softlaunch

Product details

  • ISBN 9781098139186
  • Dimensions: 178 x 233mm
  • Publication Date: 12 Jul 2024
  • Publisher: O'Reilly Media
  • Publication City/Country: US
  • Product Form: Paperback
  • Language: English
Secure checkout Fast Shipping Easy returns

In today's cloud native world, where we automate as much as possible, everything is code. With this practical guide, you'll learn how Policy as Code (PaC) provides the means to manage the policies, related data, and responses to events that occur within the systems we maintain-Kubernetes, cloud security, software supply chain security, infrastructure as code, and microservices authorization, among others.

Author Jimmy Ray provides a practical approach to integrating PaC solutions into your systems, with plenty of real-world examples and important hands-on guidance. DevOps and DevSecOps engineers, Kubernetes developers, and cloud engineers will understand how to choose and then implement the most appropriate solutions.

  • Understand PaC theory, best practices, and use cases for security
  • Learn how to choose and use the correct PaC solution for your needs
  • Explore PaC tooling and deployment options for writing and managing PaC policies
  • Apply PaC to DevOps, IaC, Kubernetes, and AuthN/AuthZ
  • Examine how you can use PaC to implement security controls
  • Verify that your PaC solution is providing the desired result
  • Create auditable artifacts to satisfy internal and external regulatory requirements

Jimmy Ray has over 25 years' experience in technology, specializing in cybersecurity, cloud architecture, containerization, and Policy as Code. His experience spans multiple industries, including aviation, finance, ecommerce, healthcare logistics, government, semiconductors, and cloud computing.

Jimmy has been writing and speaking for over 20 years, and for the past several years he has focused on providing security, compliance, and governance solutions with Policy as Code (PaC) in the areas of cloud computing, containerization, and software supply chain. Jimmy is recognized as a subject matter expert in PaC and container supply chain security.

More from this author