Microservices Security in Action teaches readers how to secure their microservices applications code and infrastructure. After a straightforward introduction to the challenges of microservices security, the book covers fundamentals to secure both the application perimeter and service-to-service c
Microservices Security in Action
β Scribed by Prabath Siriwardena, Nuwan Dias
- Publisher
- Manning Publications
- Year
- 2020
- Tongue
- English
- Leaves
- 512
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Detailed code samples, exercises, and real-world use cases help you put what you've learned into production. Along the way, authors and software security experts Prabath Siriwardena and Nuwan Dias shine a light on important concepts like throttling, analytics gathering, access control at the API gateway, and microservice-to-microservice communication. You'll also discover how to securely deploy microservices using state-of-the-art technologies including Kubernetes, Docker, and the Istio service mesh. Lots of hands-on exercises secure your learning as you go, and this straightforward guide wraps up with a security process review and best practices. When you're finished reading, you'll be planning, designing, and implementing microservices applications with the priceless confidence that comes with knowing they're secure!
What's inside
* Microservice security concepts
* Edge services with an API gateway
* Deployments with Docker, Kubernetes, and Istio
* Security testing at the code level
* Communications with HTTP, gRPC, and Kafka
β¦ Table of Contents
PART 1 OVERVIEW
1 Microservices security landscape
2 First steps in securing microservices
PART 2 EDGE SECURITY
3 Securing north/south traffic with an API gateway
4 Accessing a secured microservice via a single-page application
5 Engaging throttling, monitoring, and access control
PART 3 SERVICE-TO-SERVICE COMMUNICATIONS
6 Securing east/west traffic with certificates
7 Securing east/west traffic with JWT
8 Securing east/west traffic over gRPC
9 Securing reactive microservices
PART 4 SECURE DEPLOYMENT
10 Conquering container security with Docker
11 Securing microservices on Kubernetes
12 Securing microservices with Istio service mesh
PART 5 SECURE DEVELOPMENT
13 Secure coding practices and automation
π SIMILAR VOLUMES
Microservices promise a better way to sustainably deliver business impact. Rather than a single monolithic unit, applications built in this style are composed from loosely-coupled, autonomous services. Microservices in Action is a practical book about building and deploying microservice-based appli
The next generation of containers is here. Learn Podman directly from its creator, discover its exceptional security features, and start managing rootless containers that integrate easily into your systems. In Podman in Action you will learn how to: β’ Build and run containers in rootless mode β’
<span>The next generation of containers is here. Learn Podman directly from its creator, discover its exceptional security features, and start managing rootless containers that integrate easily into your systems.</span><span><br><br>In </span><span>Podman in Action</span><span> you will learn how to
Spring Microservices in Action, Second Edition teaches you to build microservice-based applications using Java and Spring. Summary By dividing large applications into separate self-contained units, Microservices are a great step toward reducing complexity and increasing flexibility. Spring Micro