Video description
Microservice architectures offer a lot of advantages: making it easier to scale your application and team, use different technology, and ship features more quickly. However, they also create serious challenges, such as how to properly ensure that the systems you create are secure. If done well, microservice architectures can be significantly more secure than other types of software, but if approached in a naive fashion, you can end up with a less secure, more compromised system. This video provides the sophisticated knowledge you need to create secure architectures from the ground up. The course works best for participants who understand what microservices are and who have some experience working with distributed systems.
- Discover the best framework to use when considering the security aspects of microservices
- Learn how to handle authorization and authentication, transport security, and patch hygiene
- Explore new technologies that help implement secure distributed systems in easier ways
After spending time at multiple startups and 12 years at ThoughtWorks, Sam Newman is now an independent consultant. Specializing in microservices, cloud, and continuous delivery, Sam helps clients around the world deliver software faster and more reliably. An in-demand speaker at O'Reilly Media's Software Architecture and Security conferences, Sam is the author of multiple O'Reilly Media titles, including Building Microservices and Microservices at Scale.
Table of contents
- Securing Microservices
- Just Enough Microservices
- A Model for Application Security
- Prevention: Threat Modelling
- Prevention: Protection in Transit
- Prevention: Authentication and Authorization
- Prevention: Service Meshes
- Prevention: Data at Rest
- Prevention: Keeping a Secret
- Prevention: Patching
- Prevention: Docker
- Prevention: The Three Rs
- Detection: Monitoring
- Detection: Challenges of Polyglot
- Response
- Recovery: Burn It Down!
- Recovery: Post-mortems
- Summary
Product information
- Title: Securing Microservices: Protect Sensitive Data in Transit and at Rest
- Author(s):
- Release date: March 2018
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781492038979
You might also like
book
Security Operations Center: Building, Operating and Maintaining your SOC
This is the Rough Cut version of the printed book. This is the first complete guide …
book
Securing Microservice APIs
There are several techniques for controlling access to web APIs in microservice architectures, ranging from network …
book
Kubernetes Security and Observability
Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of …
video
Introduction to Secure Software
It’s an unfortunate truism that many good developers are bad at software security. They cling to …