Security crosses every boundary of IT systems; from physical access to data centers and server racks, to encrypting communications, and all the way to validating inputs of web services endpoints. In this chapter, we will focus on the security measures that directly affect web services. We will cover the following topics:
The booking component of our sample RESTful web service being used to illustrate how security concerns can be addressed with Spring
Authentication techniques
Authorization techniques
Input validation
The use of encryption