Securing Microservices


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Explore the concepts and tasks involved in securing microservices. This course teaches you the standard approach and principles that drive DevOps security, including application-level security of microservices. You will begin by learning how to enable secure service-to-service communication with microservices. Next you will examine the role of JSON Web Token (JWT) in a security implementation. Then learn about the techniques to validate JWT in a security implementation. As you progress further through the course, you will walk through the steps of TLS mutual authentication, and identify various types of certificate revocation as well as methods to apply short-lived certificates to enhance security. Finally, learn about edge security and how to secure microservices.

Target Audience
IT architects, software designers, and developers

Prerequisites
None

Expected Duration (hours)
1.1

Lesson Objectives

Securing Microservices

  • start the course
  • describe the standard approach to securing microservices
  • list the principles driving security with DevOps
  • specify the application level security of microservices
  • enable secure service-to-service communication with microservices
  • describe the role of JSON JWT in a security implementation
  • validate JWT in a security implementation
  • demonstrate the process of identifying the user
  • illustrate the steps of TLS mutual authentication
  • identify the various types of certificate revocation
  • describe the approach of using short-lived certificates
  • describe edge security and demonstrate the implementation of edge security
  • list and describe the security considerations to secure microservices
  • identify and perform basic security
  • Course Number:
    sd_dmjs_a04_it_enus

    Expertise Level
    Intermediate