-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
The Cloud Adoption Playbook
By :
As depicted in Figure 6-1 earlier in this chapter and getting back to the notion of building applications with secure engineering practices, we encounter a couple of subjects that can fall into the realm of secure DevOps. The first is a subject we’ve already discussed: key and certificate management.
It’s incredibly common in microservices applications, for example, to use a technique called JSON Web Tokens (JWT). JWTs are an open, industry-standard method for representing claims securely between two parties as defined in IETF RFC 7519. They are commonly used, for example, to authenticate calls between JavaScript front ends running in a browser, and microservices back ends that process requests from the JavaScript. JWT works by using digitally signed tokens. Any time you have a digital signature, you have a key management problem, so secure key management becomes part of a secure DevOps process. Key management isn’t the only practice of secure DevOps...
Change the font size
Change margin width
Change background colour