filmov
tv
Security Patterns for Microservice Architectures

Показать описание
Are you securing your microservice architectures by hiding them behind a firewall? That works, but there are better ways to do it. This talk will examine well-known and often-used security patterns in the world of microservices.
#Microservices #Security #WebSecurity
Table of Contents
3:05 1. Be Secure by Design
8:13 2. Scan Dependencies
11:03 3. Use HTTPS Everywhere
19:40 4. Use Access and Identity Tokens
25:06 5. Encrypt and Protect Secrets
27:01 6. Verify Security with Delivery Pipelines
30:12 7. Slow Down Attackers
31:08 8. Use Docker Rootless Mode
31:43 9. Use Time-Based Security
33:36 10. Scan Docker and Kubernetes Configuration for Vulnerabilities
35:15 11. Know Your Cloud and Cluster Security
-------------------------------------------------------------------------------------------------------------------------
Okta is a developer API service that stores user accounts for your web apps, mobile apps, and APIs.
#Microservices #Security #WebSecurity
Table of Contents
3:05 1. Be Secure by Design
8:13 2. Scan Dependencies
11:03 3. Use HTTPS Everywhere
19:40 4. Use Access and Identity Tokens
25:06 5. Encrypt and Protect Secrets
27:01 6. Verify Security with Delivery Pipelines
30:12 7. Slow Down Attackers
31:08 8. Use Docker Rootless Mode
31:43 9. Use Time-Based Security
33:36 10. Scan Docker and Kubernetes Configuration for Vulnerabilities
35:15 11. Know Your Cloud and Cluster Security
-------------------------------------------------------------------------------------------------------------------------
Okta is a developer API service that stores user accounts for your web apps, mobile apps, and APIs.
Security Patterns for Microservice Architectures
Security Patterns for Microservice Architectures
What Are Microservices Really All About? (And When Not To Use It)
Authentication & Authorisation in Microservices Short
Microservices Security Architecture (+ Cybersecurity basics)
Event-Driven Architecture: Explained in 7 Minutes!
What Is A Backend For A Frontend (BFF) Architecture Pattern
Top 7 Most-Used Distributed System Patterns
Software Architecture Patterns Explained: 🏗️ Top 15 System Design Patterns | #ArchitecturePatterns...
Top 5 Most Used Architecture Patterns
LJC Virtual Meetup: Security Patterns for Microservice Architectures
Microservices Security Patterns & Best Practices || Microservices Architecture
Microservices Explained in 5 Minutes
3 Security Patterns | System Design Interview | Federated Identity, Gatekeeper, Valet Key
Microservices Authentication/Authorization architectural pattern
Essential Security Patterns
5 Important Sections to learn in Microservices Design & Architecture Pattern
Microservices Design Patterns | Microservices Architecture Patterns | Edureka
Building Security and Resilience in a Microservices Architecture
Monolithic vs Microservice Architecture: Which To Use and When?
Data Strategies for Microservice Architectures
Top Architectural Patterns #javascript #python #web #coding #programming
Microservices Skills: Microservices Security Fundamentals Course Preview
Patterns and techniques for securing Microservices
Комментарии