• Complain

Prabath Siriwardena - Microservices Security in Action

Here you can read online Prabath Siriwardena - Microservices Security in Action full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Shelter Island, NY, year: 2020, publisher: Manning Publications, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Prabath Siriwardena Microservices Security in Action
  • Book:
    Microservices Security in Action
  • Author:
  • Publisher:
    Manning Publications
  • Genre:
  • Year:
    2020
  • City:
    Shelter Island, NY
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Microservices Security in Action: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Microservices Security in Action" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Detailed code samples, exercises, and real-world use cases help you put what youve learned into production. Along the way, authors and software security experts Prabath Siriwardena and Nuwan Dias shine a light on important concepts like throttling, analytics gathering, access control at the API gateway, and microservice-to-microservice communication. Youll also discover how to securely deploy microservices using state-of-the-art technologies including Kubernetes, Docker, and the Istio service mesh. Lots of hands-on exercises secure your learning as you go, and this straightforward guide wraps up with a security process review and best practices. When youre finished reading, youll be planning, designing, and implementing microservices applications with the priceless confidence that comes with knowing theyre secure!Whats inside* Microservice security concepts* Edge services with an API gateway* Deployments with Docker, Kubernetes, and Istio* Security testing at the code level* Communications with HTTP, gRPC, and Kafka

Prabath Siriwardena: author's other books


Who wrote Microservices Security in Action? Find out the surname, the name of the author of the book and a list of all author's works by series.

Microservices Security in Action — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Microservices Security in Action" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Microservices Security in Action - image 1

Microservices Security in Action

Prabath Siriwardena and Nuwan Dias

To comment go to liveBook

Microservices Security in Action - image 2

Manning

Shelter Island

For more information on this and other Manning titles go to

manning.com

Copyright

For online information and ordering of these and other Manning books, please visit manning.com. The publisher offers discounts on these books when ordered in quantity.

For more information, please contact

Special Sales Department

Manning Publications Co.

20 Baldwin Road

PO Box 761

Shelter Island, NY 11964

Email: orders@manning.com

2020 by Manning Publications Co. All rights reserved.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by means electronic, mechanical, photocopying, or otherwise, without prior written permission of the publisher.

Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in the book, and Manning Publications was aware of a trademark claim, the designations have been printed in initial caps or all caps.

Recognizing the importance of preserving what has been written, it is Mannings policy to have the books we publish printed on acid-free paper, and we exert our best efforts to that end. Recognizing also our responsibility to conserve the resources of our planet, Manning books are printed on paper that is at least 15 percent recycled and processed without the use of elemental chlorine.

Microservices Security in Action - image 3

Manning Publications Co.

20 Baldwin Road Technical

PO Box 761

Shelter Island, NY 11964

Development editor:

Marina Michaels

Technical development editor:

Jonathan Thoms and Joshua White

Review editor:

Ivan Martinovi

Production editor:

Deirdre S. Hiam

Copy editor:

Sharon Wilkey

Proofreader:

Keri Hales

Technical proofreader:

Thorsten P. Weber

Typesetter and cover designer:

Marija Tudor

ISBN: 9781617295959

dedication

To Dr. Sanjiva Weerawarana, our mentor for more than a decade and for many more years to come!

front matter
preface

While working at WSO2 for more than a decade, weve seen how the integration domain evolved over time from SOAP-based services to JSON/RESTful services and then to microservices. We spent most of our early days at WSO2 contributing to the Apache Axis2 project, which was a popular SOAP engine in those days, and to the Apache Rampart project, which implements many Organization for the Advancement of Structured Information Standards (OASIS) standards for web services security. Even though SOAP was quite promising in those days, it started to fade rapidly over time, and clearly JSON/RESTful services had won. Most of the microservice implementations we see today follow RESTful design principles.

In the last two to three years, weve seen a genuine interest from many companies weve worked with to move into microservices architecture, and projects starting from scratch are adopting microservices principles. Most of the early adopters of microservices just wanted to get things done, and worried mostly about implementing functional requirements. They didnt worry too much about security, although they should have. In many cases, securing microservices would mean securing the interactions among microservices with Transport Layer Security (TLS), and may be, for some, enforcing mutual TLS for service-to-service authentication. But none of them are quite adequate. There are two main reasons many didnt worry much about security: complexity and awareness.

Some time back, we found that most tools for securing microservices were not easy to use or couldnt address the challenges specific to microservices deployments. This complexity was a barrier to securing microservices. At the same time, people who didnt put much effort into security werent fully aware of the risks. We started hearing these stories from many of our customers as well as from the extended open source community we work with. That motivated us to write this book on securing microservices. Bringing an idea from inception to reality takes considerable time and effort. We lived with this idea of writing a book for more than two years until Manning reached out to us. During that period, with the increased adoption of microservices, the infrastructure around microservices security also evolved.

Writing a book about a rapidly evolving domain is bit of a challenge; you never know when your book will be obsolete. After discussing this challenge with the publisher, we decided to put more weight on principles and patterns, and use tools just to demonstrate how to apply those principles and patterns in practice. This was our ground rule in picking up the technology stack for the book. We use Spring Boot / Java to develop all the samples, though we dont expect you to know either Java or Spring Boot in detail. If you have development experience in any programming language, you should be able to follow all the samples in the book with no difficulty.

Security itself is a larger domain. Securing microservices can mean different things to different people, based on their experiences and expectations. This fact was highlighted by one of the reviewers of the book, who comes from a security testing background. In our book, we wanted to focus on managing access to microservices. In other words, we wanted to focus on securing access to microservices with authentication and authorization. So, the book doesnt talk about protecting microservices against different types of attacks, such as SQL injection, cross-site scripting (XSS), cross-site request forgery, and so on.

After a marathon effort that spanned slightly more than two years, we are glad to see that our book on microservices security is out. We are also excited that this is the very first book on securing microservices. We hope you will enjoy reading it!

acknowledgments

This book would not have been possible without the support of many amazing people:

  • Brian Sawyer, senior acquisitions editor at Manning, reached out to us and helped us structure our book proposal.
  • Marina Michaels, development editor at Manning, was very patient and tolerant of us throughout the publishing process and provided invaluable advice during the writing process.
  • To the rest of the staff at Manning: Deirdre Hiam, the project editor; Sharon Wilkey, the copyeditor; Keri Hales, the proofreader; and Ivan Martinovic ,the review editor.
  • All the Manning Early Access Program (MEAP) subscribers of the book.
  • Thorsten P. Weber, technical proofreader, who helped us review the code to make sure all the code samples work as expected.
  • Tim Hinrichs, one of the creators of the Open Policy Agent (OPA) project, and Andrew Jessup, one of the creators of the SPIFFE project, who helped us by reviewing the appendices on OPA and SPIFFE.
  • Sanjiva Weerawarana, the founder and CEO of WSO2, and Paul Fremantle, the CTO of WSO2, who have constantly mentored us for many years.
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Microservices Security in Action»

Look at similar books to Microservices Security in Action. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Microservices Security in Action»

Discussion, reviews of the book Microservices Security in Action and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.