source: https://www.goodreads.com/book/show/1069827.Release_It_
Backlinks
- Model: OWASP top 10
- OWASP Broken Access Control
- OWASP Broken Authentication and Session Management
- OWASP Cross Site Scripting (XSS)
- OWASP Cross-Site Request Forgery (CSRF)
- OWASP Injection
- OWASP Insufficient Attack Protection
- OWASP Security Misconfiguration
- OWASP Sensitive Data Exposure
- OWASP Underprotected APIs
- OWASP Using Components with Known Vulnerabilities
- OWASP XML External Entities (XXE)
- Heuristic: when software load balancing becomes insufficient
- Architecture pattern: global dns + regional load balancers
- Heuristic: log level INFO for interesting state transitions
- Heuristic: log levels ERROR & SEVERE should require action of the by the operators
- Heuristic: nominal values for continuous metrics
- Heuristic: production software vs control plane
- Heuristic: useful controls for Control Plane - live control
- Heuristic: useful metrics
- Heuristic: when to run your own software load balancer
- Heuristic: when to use automation
- Model: 12-factor app
- Model: health check
- Model: platform team
- Model: push vs pull log collection
- Pattern: canary deployments
- Pattern: immutable infrastructure (aka phoenix server)
- Pattern: put all dependencies in a private repository
- Pattern: split deployment view and runtime view
- Pattern: use SLA to determine when to start load shedding
- Model: Blameless Postmortem