Главная
Study mode:
on
1
Welcome
2
Book
3
Breaches
4
Meltdown and Spectre
5
GDPR
6
Application delivery
7
A deal fries
8
Experts
9
Hexagons
10
Microservice Architecture
11
Single Egg Problem
12
Defense indepth
13
The problem
14
A crash
15
Assessing security risks
16
Verizon Data Breach Report
17
Bad Passwords
18
NIST
19
Long passwords
20
Complex password schemes
21
Password entropy
22
Password managers
23
The Three Hour
24
Advanced Persistent Threat
25
Target Data Breach
26
DNC Hack
27
Rotation
28
Repair
29
Shortlived credentials
30
Tools
31
Vault
32
James Sharding
33
Console Template
34
Security Breaches
35
Equifax
36
Patch hygiene
37
Microservice architectures
38
Stack diagrams
39
Docker vulnerability scanning
40
Unpatched operating systems
41
Thirdparty dependencies
42
The key thing
43
The first step
44
Transport security
45
HTTP TLS
46
Certificate Management
47
HTTPS
48
Core Concerns
49
Observation of Data
50
Protocols
51
Transport Authentication
52
Jot Tokens
53
Service Mesh
54
Services Communication
55
Version Drift
56
Sidecar
Description:
Explore a comprehensive examination of microservice security challenges and solutions in this conference talk. Delve into the technical aspects of securing microservice architectures, including protecting information flow across networks and maintaining security levels comparable to monolithic systems. Learn about key security challenges specific to microservices and discover approaches to address these issues. Gain insights into advanced security concepts such as secret stores, time-limited credentials, improved backup strategies, confused deputy problems, JWT tokens, and service meshes. Understand the state-of-the-art techniques for building secure microservice architectures, covering topics like transport security, certificate management, service mesh implementation, and version drift management. Examine real-world security breaches, password best practices, and the importance of patch hygiene in microservice environments. Acquire valuable knowledge on assessing security risks, implementing defense-in-depth strategies, and addressing the unique security concerns that arise in distributed systems. Read more

Insecure Transit - Microservice Security

NDC Conferences
Add to list