Microservices Security in Action



Brief content:

- Microservices security landscape

- First steps in securing microservices

- Securing north/south traffic with an API gateway

- Accessing a secured microservice via a single-page application

- Engaging throttling, monitoring, and access control

- Securing east/west traffic with certificates

- Securing east/west traffic with JWT

- Securing east/west traffic over gRPC

- Securing reactive microservices

- Conquering container security with Docker

- Securing microservices on Kubernetes

- Securing microservices with Istio service mesh

- Secure coding practices and automation



#literature #k8s #docker #ops