This article is part of the series on Microservices Architecture.
It goes without saying, security is of utmost importance in any application. And there are many best practices and ways to secure the application at various points. Covering all security measures is out of scope of this article, so we are going to leave out the common practices that are followed such as –
Secure communication (HTTPS, XSS and CSRF protection)
Securing data at rest
Key management
Intrusion Detection and Prevention
Logging
… and many others Continue reading