Part 4. Secure deployment

In part 3, you learned how to secure service-to-service communications in a microservices deployment. But you still have all your microservices deployed on your physical machine. In this part of the book, you’ll learn how to extend the samples you had in part 3 so you can deploy them in a containerized environment.

Chapter 10 teaches you how to deploy your microservices in Docker and to secure service-to-service interactions with mTLS and JWT. Also in chapter 10, you’ll learn some of the built-in security features related to Docker.

Chapter 11 teaches you how to deploy your microservices as Docker containers in Kubernetes and to secure service-to-service communications with JWT over mTLS.

In chapters 10 and 11, each microservice by itself must worry about doing security processing. In short, each microservice embeds a set of Spring Boot libraries to do security processing. In chapter 12, you’ll learn how to offload the security processing overhead from your microservices by using the Istio service mesh.

When you’re finished with this part of the book, you’ll know how to deploy your microservices in a containerized environment and protect service-to-service communications by using the Istio service mesh.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.150.80