Microservices: Security

Microservices: Security

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 49m | 251 MB

Cyberattacks are on the rise—and your microservices may very well be underprotected. Microservices present new safety considerations, and while protective techniques exist, the implementation can be complex and challenging to understand. This course provides developers with a playbook for safeguarding such services using various strategies and levels of security. Learn about security concepts that must be addressed for all information systems and explore microservice-specific concerns like distributed security checks and advanced identity management. Instructor Kevin Bowersox discusses patterns for establishing identity management, access control, and secure communications between services in a microservice-based system. Kevin also goes in depth on how you can leverage API gateways and identity providers to create better defenses, use principles to secure containers that are commonly used for microservice deployments, and more.

Table of Contents

1 Securing microservices
2 Microservices learning curve
3 Microservice concepts
4 Security fundamentals
5 Microservice security challenges
6 Distributed access management patterns
7 Identity and Access Management platforms
8 API gateways
9 Access scenarios
10 Tokens
11 OAuth 2 primer
12 Issuing tokens
13 Issuing identity tokens with OIDC
14 Token validation
15 Token maintenance and protection
16 MTLS
17 Securing east to west traffic
18 Monitoring and logging
19 Service mesh
20 Throttling and rate limiting
21 Container runtime security
22 Image security
23 Secrets management
24 Secure pipelines
25 Securing microservices