-
Article
The fundamental elements of security in microservices
No one-size-fits-all method exists to defend microservices apps, but you can be confident in your security by adopting specific strategies that thrive in a microservices setting. Read Now
-
Article
5 critical components of a microservices security plan
Microservices have introduced a wave of security complexity. Before you run containerized microservices in production, carefully review these five critical security practices. Read Now
-
Article
Docker and Kubernetes monitoring tools that work on microservices
What does it take to manage your containers? Explore a wide range of monitoring tools specifically suited for Docker and Kubernetes. Read Now
-
Article
Test yourself on the challenges of microservices security
Think you know what complicates microservices security and what precautions to take to maximize protection? Challenge yourself, and take this quiz to find out. Read Now
Editor's note
Organizations develop security strategies to specifically address the vulnerabilities of their application architectures. Traditional security methods applied to monolithic applications don't cut it in a microservices architecture. In order to meet the pace of architecture changes, teams need to rethink how they approach security.
This guide brings together a number of tips, advice columns, tool reviews and other resources that should help you develop an understanding of microservices security and the strategy you need to pursue.
1Basics of microservices security
Microservices present a decentralized and granular architecture, a fact that brings forth specific security challenges. Explore how microservices fundamentally change security requirements and why they require a shift in IT security mentality. Then, try the quiz to put your microservices security knowledge to the test.
-
Article
The fundamental elements of security in microservices
No one-size-fits-all method exists to defend microservices apps, but you can be confident in your security by adopting specific strategies that thrive in a microservices setting. Read Now
-
Article
Test yourself on the challenges of microservices security
Think you know what complicates microservices security and what precautions to take to maximize protection? Challenge yourself, and take this quiz to find out. Read Now
2Form a security plan for microservices
A microservices security plan involves managing numerous interdependent parts and a large attack surface for applications. This level of risk requires a concerted defense-in-depth strategy, which covers monitoring, logging, tracing and threat detection. Learn how to build each layer of a multilevel microservices security plan and attune development and security teams to this architecture's requirements.
-
Article
5 critical components of a microservices security plan
Microservices have introduced a wave of security complexity. Before you run containerized microservices in production, carefully review these five critical security practices. Read Now
-
Article
How to build a layered approach to security in microservices
Make your microservices-based app as secure as possible by adopting an in-depth, layered security strategy because no single traditional approach can reliably do the job. Read Now
-
Article
Let's develop best practices for security in DevOps
We've turned to DevOps and microservices because they've made it faster and easier to release and update applications. It's past time we developed security practices for them. Read Now
3Microservices security tooling and techniques
After building an in-depth microservices security plan, find the right tools. While some of these tools are similar to traditional products for IT security on monolithic apps, there is also a call for new utilities that bring about increased levels of automation -- a must for protecting a distributed architecture. These expert articles assess the top tools for distributed tracing, security automation, container monitoring and other key security tasks so that you can put together a microservices security toolchain with confidence.
-
Article
How to make automation part of your microservices security
It's not ideal to manually test and secure a microservices environment. Consider automation tools when you need to fortify your microservices security plan. Read Now
-
Article
Distributed tracing gives microservices monitoring more clarity
When you have users interacting with multiple services with each action, finding the cause of a problem becomes a difficult hunt. Distributed tracing helps highlight the issues. Read Now
-
Article
Docker and Kubernetes monitoring tools that work on microservices
What does it take to manage your containers? Explore a wide range of monitoring tools specifically suited for Docker and Kubernetes. Read Now