Category: Security, Docker, automation

by In the 1st chapter of the book, Microservices Security in Action, which I authored with Nuwan Dias , we list out a set of key challenges in securing microservices, and then throughout the book see how we can methodically address them.

This situation is one of the fundamental challenges in building a security design for microservices.

Correlating requests among microservices is challenging, and you have to rely on distributed tracing systems like Jaeger and Zipkin.

The whole purpose of expecting servers to be immutable in a microservices deployment is to make deployment clean and simple.

Related Articles