Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
Cloud-Native Applications in Java

You're reading from   Cloud-Native Applications in Java Build microservice-based cloud-native applications that dynamically scale

Arrow left icon
Product type Paperback
Published in Feb 2018
Publisher Packt
ISBN-13 9781787124349
Length 406 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Authors (4):
Arrow left icon
 Olsson Olsson
Author Profile Icon Olsson
Olsson
 Mahajan Mahajan
Author Profile Icon Mahajan
Mahajan
 Kumar Gupta Kumar Gupta
Author Profile Icon Kumar Gupta
Kumar Gupta
 S S
Author Profile Icon S
S
Arrow right icon
View More author details
Toc

Table of Contents (20) Chapters Close

Title Page
Dedication
Packt Upsell
Foreword
Contributors
Preface
1. Introduction to Cloud-Native FREE CHAPTER 2. Writing Your First Cloud-Native Application 3. Designing Your Cloud-Native Application 4. Extending Your Cloud-Native Application 5. Testing Cloud-Native Applications 6. Cloud-Native Application Deployment 7. Cloud-Native Application Runtime 8. Platform Deployment – AWS 9. Platform Deployment – Azure 10. As a Service Integration 11. API Design Best Practices 12. Digital Transformation 1. Other Books You May Enjoy Index

The role of security


With the proliferation of microservices, the challenges of managing security for these services becomes a challenge. Some of the questions that need to be answered, besides the Open Web Application Security Project (OWASP) top ten web vulnerabilities, are as follows:

  • Does the service require the client to authenticate before service invocation (such as OAuth)?
  • Can a client call any service or only the service for which it is authorized?
  • Does the service know the identity of the client from where the request originated and does it get passed down to the downstream services? Do the downstream services have a mechanism to verify the authorization of their invocation?
  • Is the traffic between service to service invocation secured (HTTPS)?
  • How do we verify that a request received from an authenticated user hasn't been tampered with?
  • How do we detect and reject a replay of a request?

In the distributed microservice model, we need to control and limit the privileges the calling party...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime
Visually different images