Understanding microservice security

Microservice architectures are increasingly popular, but they bring with them increased complexity and new challenges. One of the more challenging areas with any microservice style architecture is security; application security is different than with a monolith, protecting data in transit and at res...

Full description

Bibliographic Details
Main Author: Newman, Sam (instrructor)
Format: eBook
Language:English
Published: [Place of publication not identified] O'Reilly Media, Inc. 2023
Edition:[First edition]
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Description
Summary:Microservice architectures are increasingly popular, but they bring with them increased complexity and new challenges. One of the more challenging areas with any microservice style architecture is security; application security is different than with a monolith, protecting data in transit and at rest, and protecting your microservices whilst still allowing a high degree of independence. With more moving parts, understanding what security posture is required for your microservices architecture can be hard to understand. Join expert Sam Newman where he will show you that while microservice architectures can present more challenges regarding the security of our applications they also give us more ways to build and operate secure systems. At the end of the class you'll have a better appreciation for security best practices for microservice style architectures and where to spend your time to deliver the right level of security for your microservice architecture. What you'll learn and how you can apply it: Understand the functions and principles of microservice security, and how microservice architectures change some of the common challenges of application security Understand how to use threat modeling, trust The challenges of patching microservices, and how to handle secrets What types of protection may be needed to protect data in transit and at rest How to identify where technologies like JWT or Open Policy Agent can be used in the context of authentication and authorization This course is for you because: You have a microservice architecture and are worried it isn't secure You're planning a microservice architecture and don't know where to start regarding security You're a developer or architecture trying to build more skills in the area of security, so you can build security thinking into how you build your system Prerequisites: Awareness of what microservices are
Physical Description:1 video file (2 hr., 40 min.) sound, color