Designing Secure Microservice Architectures

Description

Microservices are growing in popularity and use. If done well, they can enable organizations to build and maintain their systems in ways that allow them to scale bigger, deploy faster, and be more resilient than their monolithic counterparts.

This also means securing them is slightly different, requiring us to focus more on specific areas like authentication, authorization, alerting, and resource hardening.

In this course, we’ll introduce new concepts and principles that relate to microservices — specifically focusing on where security is involved and how it can add value. We’ll also share the patterns you can use and different ways you can apply security to your architecture designing flows.


Duration

Takes approximately 1 hour to complete


Certification

Security Architect Level 2


Course Objectives

  • Understand the difference between monolithic and microservice architecture models and technologies.

  • Identify the value in security first design.

  • Discuss different challenges and solutions to common microservices threats and risks.

  • Learn the patterns for how you can include security in your design process.


Syllabus

Module 1: Introduction to microservice architectures

  • Understanding microservice architecture models and technologies involved

  • The challenges and benefits of microservice or monolithic architecture models

  • What value security adds to microservice architecture models

Module 2: Microservice and API security threats

  • What security risks and threats to consider when designing microservice architectures

Module 3: Designing secure microservice architectures

  • What value you get out of including security in the design of your microservice architecture model

  • What design challenges you face that drive different security risks and threats

  • Applying secure design principles for microservice architectures

Previous
Previous

Threat Assessment for Software Development

Next
Next

Finding and Fixing Web Application Security Vulnerabilities