Securing Microservices: Protect Sensitive Data in Transit and at Rest

Securing Microservices: Protect Sensitive Data in Transit and at Rest

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 2h 35m | 0.99 GB

Microservice architectures offer a lot of advantages: making it easier to scale your application and team, use different technology, and ship features more quickly. However, they also create serious challenges, such as how to properly ensure that the systems you create are secure. If done well, microservice architectures can be significantly more secure than other types of software, but if approached in a naive fashion, you can end up with a less secure, more compromised system. This video provides the sophisticated knowledge you need to create secure architectures from the ground up. The course works best for participants who understand what microservices are and who have some experience working with distributed systems.

  • Discover the best framework to use when considering the security aspects of microservices
  • Learn how to handle authorization and authentication, transport security, and patch hygiene
  • Explore new technologies that help implement secure distributed systems in easier ways
Table of Contents

1 Securing Microservices
2 Just Enough Microservices
3 A Model for Application Security
4 Prevention – Threat Modelling
5 Prevention – Protection in Transit
6 Prevention – Authentication and Authorization
7 Prevention – Service Meshes
8 Prevention – Data at Rest
9 Prevention – Keeping a Secret
10 Prevention – Patching
11 Prevention – Docker
12 Prevention – The Three Rs
13 Detection – Monitoring
14 Detection – Challenges of Polyglot
15 Response
16 Recovery – Burn It Down!
17 Recovery – Post-mortems
18 Summary