YoVDO

Security Patterns for Microservice Architectures

Offered By: Okta via YouTube

Tags

Microservices Security Courses Continuous Integration Courses Secret Management Courses Docker Security Courses Access Tokens Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore well-known and effective security patterns for microservice architectures in this 40-minute conference talk. Learn how to move beyond simple firewall protection and implement robust security measures. Discover 11 essential security patterns, including secure design principles, dependency scanning, HTTPS implementation, access and identity token usage, secret encryption, security verification in delivery pipelines, attacker slowdown techniques, Docker rootless mode, time-based security, vulnerability scanning for Docker and Kubernetes configurations, and cloud and cluster security best practices. Gain valuable insights to enhance the security of your microservice-based applications and protect your systems from potential threats.

Syllabus

1. Be Secure by Design
2. Scan Dependencies
3. Use HTTPS Everywhere
4. Use Access and Identity Tokens
5. Encrypt and Protect Secrets
6. Verify Security with Delivery Pipelines
7. Slow Down Attackers
8. Use Docker Rootless Mode
9. Use Time-Based Security
10. Scan Docker and Kubernetes Configuration for Vulnerabilities
11. Know Your Cloud and Cluster Security


Taught by

Okta

Related Courses

Tokenisation and Encryption in Digital Payments, FinTech
Udemy
Adding Business Logic to Your Tokens - What Could Possibly Go Wrong
NDC Conferences via YouTube
APIs Exposed
NDC Conferences via YouTube
ASP.NET Core 3 - IdentityServer4 - Implementing Sign-in Redirect with OIDC-Client.js - Episode 15
Raw Coding via YouTube
ASP.NET Core 3 - OAuth Client Implementation - Episode 6
Raw Coding via YouTube