Security patterns for microservice architectures

 /  EN

Are you securing your microservice architectures by hiding them behind a firewall? That works, but there are better ways to do it. This presentation recommends 11 patterns to secure microservice architectures.

  1. Be secure by design
  2. Scan dependencies
  3. Use HTTPS everywhere
  4. Use access and identity tokens
  5. Encrypt and protect secrets
  6. Verify security with delivery pipelines
  7. Slow down attackers
  8. Use Docker rootless mode
  9. Use time-based security
  10. Scan Docker and Kubernetes configuration for vulnerabilities
  11. Know your cloud and cluster security

Speakers

Matt Raible
Okta

Matt Raible is a well-known figure in the Java community and has been building web applications for most of his adult life. For over 20 years, he has helped developers learn and adopt open source frameworks and use them effectively. He's a web developer, Java Champion, and Developer Advocate at Okta. Matt is a frequent contributor to open source and a big fan of Java, IntelliJ, TypeScript, Angular, and Spring Boot.

He's a member of the global JHipster development team and loves classic VWs. You can find him online at @mraible and raibledesigns.com.