Thomas Südbröcker
Get started with securing your cloud-native Java microservices applications
#1about 5 minutes
Introducing the cloud-native starter security project
An overview of the sample Java microservices application, its architecture, and the security goals of the workshop.
#2about 7 minutes
Choosing an open source stack for security
Keycloak, Quarkus, and MicroProfile are chosen for their standards-based support for OpenID Connect and JSON Web Tokens.
#3about 12 minutes
Implementing the authentication and authorization workflow
The complete login flow is detailed, from the frontend JavaScript SDK to backend token propagation between microservices.
#4about 13 minutes
Understanding platform security with the Istio service mesh
Core Istio concepts are explained, including the sidecar proxy model for traffic control, ingress gateways, and mutual TLS.
#5about 6 minutes
Setting up the hands-on lab environment
Instructions are provided for requesting a pre-configured Kubernetes cluster on IBM Cloud to follow along with the workshop.
#6about 29 minutes
Configuring the Istio ingress with a TLS certificate
This lab section covers installing Istio and configuring the ingress gateway with a DNS name and a Let's Encrypt TLS certificate.
#7about 17 minutes
Deploying and configuring the full application stack
The lab continues with deploying Keycloak, the Java microservices, and the web frontend onto the Kubernetes cluster.
#8about 17 minutes
Enforcing internal security with mTLS and authorization policies
Learn how to apply a strict mutual TLS policy to encrypt all internal traffic and use authorization policies to control service-to-service communication.
#9about 2 minutes
Conclusion and next steps in cloud security
The workshop concludes with a recap and a look at other important security dimensions like container scanning and vulnerability management.
Related jobs
Jobs that call for the skills explored in this talk.
IGEL Technology GmbH
Bremen, Germany
Senior
Java
IT Security
PROSOZ Herten GmbH
Herten, Germany
€47-70K
Junior
Intermediate
Senior
Java
Matching moments
05:32 MIN
Understanding the core components of cloud security
Building Well-Architected applications
00:52 MIN
Summary and resources for getting started with Quarkus
Test-Driven Development: It's easier than you think!
05:27 MIN
Deploying reactive apps and key takeaways
Development of reactive applications with Quarkus
02:52 MIN
Q&A on managed Kubernetes security in the cloud
Kubernetes Security - Challenge and Opportunity
11:25 MIN
Q&A on microservice architecture and security
Security Challenges of Breaking A Monolith
01:20 MIN
Building and securing the new microservices architecture
How to Destroy a Monolith?
02:04 MIN
Centralizing security services in a Kubernetes ecosystem
DevSecOps: Security in DevOps
03:26 MIN
Accelerating development with AI and security tools
30 powerful AWS hacks in just 30 minutes: Boost your developer productivity
Featured Partners
Related Videos
Development of reactive applications with Quarkus
Niklas Heidloff
You can’t hack what you can’t see
Reto Kaeser
Enabling automated 1-click customer deployments with built-in quality and security
Christoph Ruggenthaler
Security Challenges of Breaking A Monolith
Reinhard Kugler
2021: Familiar APIs on Kickass Runtimes #slideless
Adam Bien
Walking into the era of Supply Chain Risks
Vandana Verma
Serverless Java in Action: Cloud Agnostic Design Patterns and Tips
Kevin Dubois & Daniel Oh
DevSecOps: Security in DevOps
Aarno Aukia
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.

consider it GmbH
Hamburg, Germany
Rust
Azure
Linux
DevOps
Python
+5

Prostaff Schweiz Gmbh
St. Gallen, Switzerland
Java
Scrum
DevOps
Angular
Continuous Integration
+1

CloudCommand GmbH
Stade, Germany
Network Security
Network administration

univativ GmbH & Co. KG
Bitburger Land, Germany
€75K
Senior
JIRA
Azure
Typo3
Gitlab
+3

mund consulting AG
Senior
CSS
GIT
Java
Eclipse
Angular
+2

Gallmond Personalberatung
Berlin, Germany
€85K
Terraform
Kubernetes
Data analysis
Amazon Web Services (AWS)


CloudCommand GmbH
Stralsund, Germany
Network Security
Network administration

init AG
Karlsruhe, Germany
Java
VoIP
Scrum
DevOps
Docker
+5