アプリケーションセキュリティ検査・検証の標準化
Application Security Verification Standard Project
speaker: Riotaro OKADA (@okdt) at OWASP Night 18th (2015/7/29), Tokyo, Japan
https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project
アプリケーションセキュリティ検査・検証の標準化
Application Security Verification Standard Project
speaker: Riotaro OKADA (@okdt) at OWASP Night 18th (2015/7/29), Tokyo, Japan
https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project
The document discusses OAuth and OpenID Connect protocols. It provides diagrams illustrating the flows of OAuth authorization code grant, implicit grant and hybrid grant flows. It also compares OAuth and OpenID Connect, noting that OpenID Connect builds upon OAuth by adding an identity layer. Key aspects of OpenID Connect like ID tokens and their claims are outlined. Examples of OAuth and OpenID Connect implementations are provided at the end.
This document provides an overview of serverless technology and its key concepts. It begins by explaining the origins of serverless computing and how major cloud providers have promoted functions as a service (FaaS) through offerings like AWS Lambda. Serverless can be defined as either abstracting away servers through fully managed services or connecting event-driven components without a centralized application server. The document then discusses FaaS and functional SaaS services and how serverless architectures are implemented through loosely coupling these components using events. It provides examples of serverless application patterns and compares the FaaS offerings from various cloud vendors.
26. Twelve-Factor App
I. コードベース
II. 依存関係
III. 設定
IV. バックエンドサービス
V. ビルド、リリース、実行
VI. プロセス
26
VII. ポートバインディング
VIII. 並行性
IX. 廃棄容易性
X. 開発/本番一致
XI. ログ
XII. 管理プロセス
全て重要なのですが、時間が足りないので、
個人的に特徴的と思うポイントのみ……
31. Twelve-Factor App
I. コードベース
II. 依存関係
III. 設定
IV. バックエンドサービス
V. ビルド、リリース、実行
VI. プロセス
31
VII. ポートバインディング
VIII. 並行性
IX. 廃棄容易性
X. 開発/本番一致
XI. ログ
XII. 管理プロセス