Загрузка страницы

Security Patterns for Microservice Architectures

Are you securing your microservice architectures by hiding them behind a firewall? That works, but there are better ways to do it. This talk will examine well-known and often-used security patterns in the world of microservices.

Blog post: https://developer.okta.com/blog/2020/03/23/microservice-security-patterns

#Microservices #Security #WebSecurity

Table of Contents

3:05 1. Be Secure by Design
8:13 2. Scan Dependencies
11:03 3. Use HTTPS Everywhere
19:40 4. Use Access and Identity Tokens
25:06 5. Encrypt and Protect Secrets
27:01 6. Verify Security with Delivery Pipelines
30:12 7. Slow Down Attackers
31:08 8. Use Docker Rootless Mode
31:43 9. Use Time-Based Security
33:36 10. Scan Docker and Kubernetes Configuration for Vulnerabilities
35:15 11. Know Your Cloud and Cluster Security
-------------------------------------------------------------------------------------------------------------------------
Okta is a developer API service that stores user accounts for your web apps, mobile apps, and APIs.

* Sign up for Okta for free at https://developer.okta.com/signup/
* For more info visit us at https://developer.okta.com/
* Developer Blog: https://developer.okta.com/blog/
* Follow us on Twitter: https://twitter.com/oktadev
* Follow us on FB: https://www.facebook.com/oktadevelopers/
* Follow us on LinkedIn: https://www.linkedin.com/company/oktadev

Видео Security Patterns for Microservice Architectures канала OktaDev
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
14 апреля 2020 г. 19:00:11
00:39:45
Яндекс.Метрика