9 Securing reactive microservices

This chapter covers

  • Using Kafka as a message broker for interservice communications
  • Using TLS in Kafka to secure messages in transit
  • Using mTLS to authenticate microservices connecting to Kafka
  • Controlling access to Kafka topics using access control lists
  • Using NATS for reactive microservices

In chapter 6 and chapter 7, we discussed how to secure service-to-service communications with mTLS and JWT. Chapter 8 extended that discussion and explained how mTLS and JWT can be used to secure communications happening over gRPC. In all those cases, our examples assumed synchronous communications between the calling microservice and the recipient microservice. The security model that you develop to protect service-to-service ...

Get Microservices Security in Action now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.