From the course: Microservices and API Security for Security Architects: From Gateway Protection to Container Security

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Security monitoring for microservices

Security monitoring for microservices

- [Instructor] Security monitoring of microservices presents a fundamentally different challenge than traditional applications. In a monolithic application, you might monitor one or two entry points and a single database. But with microservices, you have hundreds of services generating security events across multiple networks, containers, and cloud providers. You are likely being introduced to completely new types of logs that you didn't have access to before. The attack surface is distributed and so must be your monitoring strategy. To help us manage the different levels of security monitoring of microservices, let's look at the three pillars of microservices observability: distributed logging, metrics generation, and distributed tracing. The first pillar is logging. Traditional security monitoring relied heavily on network perimeter logs, but in microservices, there is no single perimeter. Instead, you need to…

Contents