Identity Security for Software Development: Building with Identity, Secrets, and Credentials
Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy integrated in your code, infrastructure, and environments from day one can help.

In this practical book, authors John Walsh, Uzi Ailon, and Matt Barker provide conceptual frameworks, technology overviews, and useful code snippets to bridge the gap between development, IT, and security to integrate robust identity security across apps, CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, process automation, IoT, and more. You'll learn:

  • What developers need to know about managing secrets and identity to build safer apps
  • What machine identities, secrets, and credentials are—and how to secure them
  • How to secure the software supply chain to build safer apps
  • How identity security fits into modern software development practices
1146226033
Identity Security for Software Development: Building with Identity, Secrets, and Credentials
Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy integrated in your code, infrastructure, and environments from day one can help.

In this practical book, authors John Walsh, Uzi Ailon, and Matt Barker provide conceptual frameworks, technology overviews, and useful code snippets to bridge the gap between development, IT, and security to integrate robust identity security across apps, CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, process automation, IoT, and more. You'll learn:

  • What developers need to know about managing secrets and identity to build safer apps
  • What machine identities, secrets, and credentials are—and how to secure them
  • How to secure the software supply chain to build safer apps
  • How identity security fits into modern software development practices
59.99 In Stock
Identity Security for Software Development: Building with Identity, Secrets, and Credentials

Identity Security for Software Development: Building with Identity, Secrets, and Credentials

by John Walsh, Uzi Ailon
Identity Security for Software Development: Building with Identity, Secrets, and Credentials

Identity Security for Software Development: Building with Identity, Secrets, and Credentials

by John Walsh, Uzi Ailon

Paperback

$59.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy integrated in your code, infrastructure, and environments from day one can help.

In this practical book, authors John Walsh, Uzi Ailon, and Matt Barker provide conceptual frameworks, technology overviews, and useful code snippets to bridge the gap between development, IT, and security to integrate robust identity security across apps, CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, process automation, IoT, and more. You'll learn:

  • What developers need to know about managing secrets and identity to build safer apps
  • What machine identities, secrets, and credentials are—and how to secure them
  • How to secure the software supply chain to build safer apps
  • How identity security fits into modern software development practices

Product Details

ISBN-13: 9781098158033
Publisher: O'Reilly Media, Incorporated
Publication date: 07/29/2025
Pages: 250
Product dimensions: 7.00(w) x 9.19(h) x 0.00(d)

About the Author

John Walsh is a distinguished authority in software security, with over 15 years of experience in various roles within enterprise security companies. From software developer to product manager, product marketing, and open-source community manager, his diverse background has equipped him with a comprehensive understanding of securing the entire software supply chain. This unique perspective enables him to communicate the intricacies of enterprise software security with clarity and depth, catering to both technical and non-technical audiences.

Uzi is a seasoned software engineering professional with over 25 years of experience, including 15 years focused on customer engagement and sales. With deep expertise in the entire software development lifecycle, security, and DevOps, Uzi understands the unique challenges enterprises face in balancing innovation with security.



As a leader in CyberArk's Machine Identities solutions, Uzi is committed to helping organizations strengthen their security posture while fostering seamless collaboration between DevOps and security teams. By leveraging automation to reduce security risks and enhance operational efficiency, Uzi enables businesses to protect their most critical assets without compromising agility. With a strong grasp of the business objectives of Fortune 500 companies, Uzi bridges the gap between technical excellence and strategic goals, ensuring that security solutions align with broader enterprise needs. His customer-centric approach and extensive industry knowledge make him a trusted advisor in driving secure, scalable, and efficient digital transformations.



Over the years, Uzi has worked with hundreds of customers, helping to design their machine identity security solutions and define best practices that enhance security, compliance, and operational effectiveness.

Matt was co-founder & CEO of Jetstack, a Kubernetes company he bootstrapped in 2015 before being acquired by Venafi in 2020. Venafi was subsequently acquired by private equity company Thoma Bravo, and then the cybersecurity company CyberArk.

Jetstack is best known for its open source project 'cert-manager', which is downloaded millions of times a day to secure cloud native infrastructure. Cert-manager was donated to the CNCF in 2020, and graduated in 2024.

Matt has played a number of product and leadership roles since being acquired, and now leads workload identity at CyberArk (think SPIFFE!) In January 2021, Matt was awarded as a top 100 Open Source Influencer by OpenUK. He also acts as Entrepreneur as Residence for Open UK, and has an advisory role with the AI engineering firm Helix.

From the B&N Reads Blog

Customer Reviews