From the course: Microservices Security Workshop: From Build to Production

Unlock this course with a free trial

Join today to access over 25,400 courses taught by industry experts.

Next steps

Next steps

- You've done it! You've secured the microservices. This course has covered a ton of information and implementing all of it is going to be a massive journey at your organization, so don't be afraid to take your time. In this course, I wanted us to focus less on specific scanning or tooling capabilities and more on how to make secure architectural decisions about microservices, from the design phase through to deployment, as well as be able to empathize with developers and understanding how security in these environments becomes a mess over time. I have another course called Application Security Posture Management: Security from the Supply Chain to Cloud to Runtime. If you felt like this course flew too quickly or high leveled through specific scanning or DevSecOps capabilities, or if you were disappointed that we didn't get hands-on with that many scanners, in that course, we go into much more detail about specific scanning methodologies and implementations. Now, download that…

Contents