Главная
Study mode:
on
1
Intro
2
Who am I
3
Fundamentals
4
The monolith
5
The basics
6
Types of threats
7
Stack Overflow
8
WASP
9
Authentication Authorization
10
Microservices
11
Planning
12
Authorization
13
Publicfacing API
14
Tokenization
15
Input Validation
16
First Time Round
17
Application Security
18
Monster Microservice
19
Coupling
20
Its not your code
21
Orchestration layer
22
Tiny components
23
Is this worrying
24
We are incredibly lazy
25
Features that scare me
26
How do we do this
27
Challenge us
28
Principle of Least Privilege
29
Define Your Roles
30
Finegrained Permissions
31
Logging and Monitoring
32
Mutable Architecture
33
Compliance
34
Perspective
35
Security benefit
36
Languages
37
Tools
38
Interdependency
39
Puppy analogy
40
Logging
41
Denial of Service
42
Hacking Team
43
Logs
44
Wrap up
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore practical approaches to securing microservices in this insightful conference talk from GOTO Chicago 2016. Delve into the fundamental differences between monolithic and microservice architectures from a security perspective. Learn about various threat types, authentication, and authorization challenges specific to microservices. Discover strategies for planning secure microservices, including tokenization, input validation, and the principle of least privilege. Examine the security implications of coupling, third-party code, and orchestration layers in microservice environments. Gain valuable insights on implementing fine-grained permissions, logging, monitoring, and maintaining compliance in mutable architectures. Understand the security benefits and potential risks associated with different programming languages and tools in microservice development. Conclude with essential takeaways on interdependency, logging practices, and defending against denial of service attacks in microservice ecosystems. Read more

Practical Microservice Security

GOTO Conferences
Add to list