Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Grab it
Explore practical approaches to securing microservices in this insightful conference talk from GOTO Chicago 2016. Delve into the fundamental differences between monolithic and microservice architectures from a security perspective. Learn about various threat types, authentication, and authorization challenges specific to microservices. Discover strategies for planning secure microservices, including tokenization, input validation, and the principle of least privilege. Examine the security implications of coupling, third-party code, and orchestration layers in microservice environments. Gain valuable insights on implementing fine-grained permissions, logging, monitoring, and maintaining compliance in mutable architectures. Understand the security benefits and potential risks associated with different programming languages and tools in microservice development. Conclude with essential takeaways on interdependency, logging practices, and defending against denial of service attacks in microservice ecosystems.
Read more