Microservices are growing in popularity and use. If done well, they can enable organizations to build and maintain their systems in ways that allow them to scale bigger, deploy faster, and be more resilient than their monolithic counterparts.
This also means securing them is slightly different, requiring us to focus more on specific areas like authentication, authorization, alerting, and resource hardening.
In this course, we’ll introduce new concepts and principles that relate to microservices — specifically focusing on where security is involved and how it can add value. We’ll also share the patterns you can use and different ways you can apply security to your architecture designing flows.
- Understand the difference between monolithic and microservice architecture models and technologies.
- Identify the value in security first design.
- Discuss different challenges and solutions to common microservices threats and risks.
- Learn the patterns for how you can include security in your design process.
Module 1: Introduction to microservice architecture
- Understanding microservice architecture models and technologies involved
- The challenges and benefits of microservice or monolithic architecture models
- What value security adds to microservice architecture models
Module 2: Microservice and API security threats
- What security risks and threats to consider when designing microservice architectures
Module 3: Designing secure microservice architectures
- What value you get out of including security in the design of your microservice architecture model
- What design challenges you face that drive different security risks and threats
- Applying secure design principles for microservice architectures