Introduction
1. Introduction
Microservices offer improved agility, scalability, and reusability, but also introduce security challenges like network traffic read by unintended services; increased risk of impersonation attacks where one service might masquerade as another to intercept or manipulate communication; unregulated access, creation, or modification of private or confidential information; service disruptions from denial of service attacks. Network security goals help solve these challenges. Encrypt Microservice traffic to restrict information access, authenticate services to verify other services, and establish trust, authorize services so that information can only be accessed by allowed services. Optionally, add additional access limitations, such as quotas, to control the load. In this section, titled "Service Mesh Security", you learn to encrypt traffic between microservices to prevent anyone in the network from gaining access to private information. Authorized services and requests, ensuring that services only access the information that is allowed access from other services. Authenticate and authorize services and requests to verify trust among services in the mesh and among end users. Limit service access in the network so that granular controls over the communication can be established.2. Let's practice!
Create Your Free Account
or
By continuing, you accept our Terms of Use, our Privacy Policy and that your data is stored in the USA.