Главная
Study mode:
on
1
Intro
2
Data Breaches
3
Software Development
4
Microservice Security
5
Microservice Architecture
6
Surface Area of Attack
7
Assessing Risks
8
Password Manager
9
Advanced Persistent Threat
10
Three pieces of advice
11
Shortlived credentials
12
Qi tools
13
Credentials
14
Secret Stores
15
Vault
16
Console Template
17
Security Breaches
18
Patch Your Stuff
19
Equifax Data Breach
20
Vulnerabilities
21
Equifax
22
Systems building on systems
23
Normal running infrastructure
24
Solutions
25
Container Scanning
26
Threat Modelling
27
Network Communication
28
Key Concerns
29
HTTP and TLS
30
HTTP TLS
31
Mutual TLS
32
Other protocols
33
Authentication
34
Authorization
35
Confused Deputy Problem
36
Making Decisions Upstream
37
What We Want
38
JWT Token
39
Service Mesh
40
Summary
Description:
Dive deep into the technical challenges and solutions for securing microservice architectures in this conference talk. Explore the benefits and potential security risks of microservices, including protecting information flow across networks. Learn about data breaches, software development practices, and assessing risks in microservice security. Discover practical advice on password management, short-lived credentials, secret stores, and patching systems. Examine container scanning, threat modeling, and network communication concerns, including HTTP, TLS, and mutual TLS. Investigate authentication, authorization, and the Confused Deputy Problem. Gain insights into making decisions upstream, using JWT tokens, and implementing service mesh solutions. Equip yourself with valuable knowledge to enhance the security of your microservice-based applications and infrastructure.

Insecure Transit - Microservice Security Challenges and Solutions

GOTO Conferences
Add to list