From the course: Microservices and API Security for Security Architects: From Gateway Protection to Container Security
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Security monitoring for microservices
From the course: Microservices and API Security for Security Architects: From Gateway Protection to Container Security
Security monitoring for microservices
- [Instructor] Security monitoring of microservices presents a fundamentally different challenge than traditional applications. In a monolithic application, you might monitor one or two entry points and a single database. But with microservices, you have hundreds of services generating security events across multiple networks, containers, and cloud providers. You are likely being introduced to completely new types of logs that you didn't have access to before. The attack surface is distributed and so must be your monitoring strategy. To help us manage the different levels of security monitoring of microservices, let's look at the three pillars of microservices observability: distributed logging, metrics generation, and distributed tracing. The first pillar is logging. Traditional security monitoring relied heavily on network perimeter logs, but in microservices, there is no single perimeter. Instead, you need to…
Contents
-
-
-
Overview of microservices-based application architecture5m
-
Microservices architecture patterns4m 28s
-
(Locked)
Authentication and access management for microservices5m 2s
-
(Locked)
Secure communication protocols for microservices2m 37s
-
(Locked)
Security monitoring for microservices3m 42s
-
(Locked)
High availability and resiliency for microservices3m 42s
-
-
-
-
-
-