Identity Security for Software Development Audiobook By John Walsh, Uzi Ailon, Matt Barker cover art

Identity Security for Software Development

Best Practices That Every Developer Must Know

Preview
Get this deal Try for $0.00
Offer ends January 21, 2026 11:59pm PT
Prime logo Prime members: New to Audible? Get 2 free audiobooks during trial.
Just $0.99/mo for your first 3 months of Audible Premium Plus.
1 audiobook per month of your choice from our unparalleled catalog.
Listen all you want to thousands of included audiobooks, podcasts, and Originals.
Auto-renews at $14.95/mo after 3 months. Cancel anytime.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo after 30 days. Cancel anytime.

Identity Security for Software Development

By: John Walsh, Uzi Ailon, Matt Barker
Narrated by: Tom Perkins
Get this deal Try for $0.00

$14.95/mo after 3 months. Cancel anytime. Offer ends January 21, 2026 11:59pm PT.

$14.95/month after 30 days. Cancel anytime.

Buy for $17.19

Buy for $17.19

LIMITED TIME OFFER | Get 3 months for $0.99 a month

$14.95/mo thereafter-terms apply.

Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy integrated in your code, infrastructure, and environments from day one can help.

In this practical book, authors John Walsh, Uzi Ailon, and Matt Barker provide conceptual frameworks, technology overviews, and useful code snippets to bridge the gap between development, IT, and security to integrate robust identity security across apps, CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, process automation, IoT, and more. You'll learn:

● What developers need to know about managing secrets and identity to build safer apps

● What machine identities, secrets, and credentials are—and how to secure them

● How to secure the software supply chain to build safer apps

● How identity security fits into modern software development practices

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2025 O'Reilly Media, Inc. (P)2025 Ascent Audio
Programming & Software Development Security & Encryption Technology Software Software Development Computer Security
No reviews yet