Get Free Shipping on orders over $79
Cloud Native Data Security with OAuth : A Scalable Zero Trust Architecture - Gary  Archer

Cloud Native Data Security with OAuth

A Scalable Zero Trust Architecture

By: Gary Archer, Judith Kahrer, Micha? Trojanowski

eText | 6 March 2025 | Edition Number 1

At a Glance

eText


$64.89

or 4 interest-free payments of $16.22 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

With the growth of cloud native applications, developers increasingly rely on APIs to make everything work. But security often lags behind, making APIs an attractive target for bad actors looking to access valuable business data. OAuth, a powerful framework for API security, offers tools to protect sensitive business data and enforce dynamic access controls. But to harness its full potential, you need more than standards—you need strategies for adapting to evolving security demands.

Designed for developers, architects, and security professionals, this guide provides everything you need to secure APIs in the cloud native era—ensuring your business data stays protected. You'll learn how to combine OAuth's token-based model with cloud native platforms like Kubernetes to build a scalable, zero trust security architecture. With OAuth, you can go beyond simple allow/deny rules and create security policies that align with business needs, while Kubernetes provides best-in-class deployment patterns to keep systems secure and efficient.

  • Understand why user identity must be part of your cloud native security stack
  • Discover how to integrate user identity into APIs
  • Learn to externalize security and secure data access using OAuth
  • Uncover methods for running security components in a Kubernetes cluster
  • Get the latest security best practices for client applications and APIs
on
Desktop
Tablet
Mobile

More in Computer Architecture & Logic Design

Quantum Computing - Alex Wood

eBOOK

Think Distributed Systems - Dominik Tornow

eBOOK