Book description
Security is usually an afterthought when organizations design microservices for cloud systems. Most companies today are exposed to potential security threats, but their responses are often more reactive than proactive. This leads to unnecessarily complicated systems that are hard to implement and even harder to manage and scale. Author Gaurav Raje shows you how to build highly secure systems on AWS without increasing overhead.
Ideal for cloud solution architects and software developers with AWS experience, this practical book starts with a high-level architecture and design discussion, then explains how to implement your solution in the cloud while ensuring that the development and operational experience isn't compromised. By leveraging the AWS Shared Responsibility Model, you'll be able to:
- Develop a modular architecture using microservices that aims to simplify compliance with various regulations in finance, medicine, and legal services
- Introduce various AWS-based security controls to help protect your microservices from malicious actors
- Leverage the modularity of the architecture to independently scale security mechanisms on individual microservices
- Improve the security posture without compromising the autonomy or efficiency of software development teams
Publisher resources
Table of contents
- Preface
- 1. Introduction to Cloud Microservices
- 2. Authorization and Authentication Basics
- 3. Foundations of Encryption
- 4. Security at Rest
- 5. Networking Security
- 6. Public-Facing Services
-
7. Security in Transit
- Basics of Transport Layer Security
- TLS Termination and Trade-offs with Microservices
- Cost and Complexity Considerations with Encryption in Transit
- Application of TLS in Microservices
- A (Very Brief) Introduction to Service Meshes: A Security Perspective
- Serverless Microservices and Encryption in Transit
- Field-Level Encryption
- Summary
- 8. Security Design for Organizational Complexity
- 9. Monitoring and Incident Response
- A. Terraform Cloud in Five Minutes
- B. Example of a SAML Identity Provider for AWS
- C. Hands-On Encryption with AWS KMS
- D. A Hands-On Example of Applying the Principle of Least Privilege
- Index
Product information
- Title: Security and Microservice Architecture on AWS
- Author(s):
- Release date: September 2021
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098101466
You might also like
book
Microservices Security in Action
Unlike traditional enterprise applications, Microservices applications are collections of independent components that function as a system. …
book
Serverless Architectures on AWS, Second Edition
Design low-maintenance systems using pre-built cloud services! Bring down costs, automate time-consuming ops tasks, and scale …
book
Deploy Containers on AWS: With EC2, ECS, and EKS
Start deploying, managing, and scaling containerized applications into AWS container infrastructure using Docker on Amazon EC2, …
book
Kubernetes: Up and Running, 2nd Edition
Kubernetes radically changes the way applications are built and deployed in the cloud. Since its introduction …