Skip to Content
Microservices Security in Action
book

Microservices Security in Action

by Prabath Siriwardena, Wajjakkara Kankanamge Anthony Nuwan Dias
August 2020
Intermediate to advanced
616 pages
18h 7m
English
Manning Publications
Content preview from Microservices Security in Action

Appendix H. Secure Production Identity Framework for Everyone

In chapter 6, we discussed the challenges in key management, including key provisioning, trust bootstrapping, certificate revocation, key rotation, and key usage monitoring. In a typical microservices deployment, each microservice is provisioned with a key pair. In chapter 6, you did that by manually copying Java keystore files to the Order Processing and Inventory microservices.

Doing things manually is not a neat approach in a microservices deployment with hundreds of services, however--everything must be automated.1 Ideally, during the CI/CD pipeline, the keys should be generated and provisioned to the microservices. In chapter 11, we discussed how to deploy and secure microservices ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Microservices in Action

Microservices in Action

Morgan Bruce, Paulo A Pereira
Microservices: Up and Running

Microservices: Up and Running

Ronnie Mitra, Irakli Nadareishvili
Microservices Security in Action video edition

Microservices Security in Action video edition

Prabath Siriwardena, Nuwan Dias

Publisher Resources

ISBN: 9781617295959Supplemental ContentPublisher SupportPublisher WebsitePurchase Link