Summary

In this chapter, we reviewed how security is handled under Heroku. We understood in detail how security is ensured when the developer pushes code to the Heroku platform by encrypting the source code using SSH. We looked at different parts of the Heroku application life cycle and reviewed how security is enforced in each of them to ensure that the Heroku platform and the applications running on the platform are secured at all times. Finally, we learned how to use two of the many popular security tools available on the Heroku platform as add-ons to search for various security gaps and for ways to close them. In the next chapter, we will learn various techniques to take the development of apps on the Heroku platform to the next level by using ...

Get Heroku Cloud Application Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.