Book Description
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best practices to help your organization design scalable and reliable systems that are fundamentally secure.
Two previous books demonstrated how and why a commitment to the entire service lifecycle enables organizations to successfully build, deploy, monitor, and maintain software systems. In this latest guide, the authors offer insights into system design, implementation, and maintenance from practitioners who specialize in security and reliability. They also discuss how building and adopting their recommended best practices requires a culture that's supportive of such change.
You'll learn about secure and reliable systems through: Design strategies; Recommendations for coding, testing, and debugging practices; Strategies to prepare for, respond to, and recover from incidents; Cultural best practices that help teams across your organization collaborate effectively.
This open access book is Complimented by Google Cloud. You can download Building Secure and Reliable Systems ebook for free in PDF format (10.4 MB).
Table of Contents
Part I
Introductory Material
Chapter 1
The Intersection of Security and Reliability
Chapter 2
Understanding Adversaries
Part II
Designing Systems
Chapter 3
Case Study: Safe Proxies
Chapter 4
Design Tradeoffs
Chapter 5
Design for Least Privilege
Chapter 6
Design for Understandability
Chapter 7
Design for a Changing Landscape
Chapter 8
Design for Resilience
Chapter 9
Design for Recovery
Chapter 10
Mitigating Denial-of-Service Attacks
Part III
Implementing Systems
Chapter 11
Case Study: Designing, Implementing, and Maintaining a Publicly Trusted CA
Chapter 12
Writing Code
Chapter 13
Testing Code
Chapter 14
Deploying Code
Chapter 15
Investigating Systems
Part IV
Maintaining Systems
Chapter 16
Disaster Planning
Chapter 17
Crisis Management
Chapter 18
Recovery and Aftermath
Part V
Organization and Culture
Chapter 19
Case Study: Chrome Security Team
Chapter 20
Understanding Roles and Responsibilities
Chapter 21
Building a Culture of Security and Reliability