Book Image

Software Architecture with Spring 5.0

By : René Enríquez, Alberto Salazar
Book Image

Software Architecture with Spring 5.0

By: René Enríquez, Alberto Salazar

Overview of this book

Spring 5 and its ecosystem can be used to build robust architectures effectively. Software architecture is the underlying piece that helps us accomplish our business goals whilst supporting the features that a product demands. This book explains in detail how to choose the right architecture and apply best practices during your software development cycle to avoid technical debt and support every business requirement. Choosing the right architecture model to support your business requirements is one of the key decisions you need to take when a new product is being created from scratch or is being refactored to support new business demands. This book gives you insights into the most common architectural models and guides you when and where they can be used. During this journey, you’ll see cutting-edge technologies surrounding the Spring products, and understand how to use agile techniques such as DevOps and continuous delivery to take your software to production effectively. By the end of this book, you’ll not only know the ins and outs of Spring, but also be able to make critical design decisions that surpass your clients’ expectations.
Table of Contents (21 chapters)
Title Page
Copyright and Credits
Packt Upsell
Contributors
Preface
Index

Chapter 13. Security

Security is a field that teams often do not pay close attention to when developing their products. There are a few key considerations that developers should keep in mind when writing code. Most of the considerations listed in this chapter are obvious, but others aren't, so we will discuss all of them.

We will cover, the following topics in this chapter:

  • Why security is important as part of an application's architecture
  • Key recommendations for keeping your software secure:
    • Authentication and authorization
    • Cryptographic
    • Data input validation
    • Sensitive data
    • Social engineering
    • Penetration testing
  • Authentication as a service

We will start by introducing the importance of security as part of an application's architecture.