Breaking News: Grepper is joining You.com. Read the official announcement!
Check it out

Microservices based Security Arch Doc Cheat Sheet¶

Pragya Keshap answered on February 21, 2023 Popularity 1/10 Helpfulness 1/10

Contents


More Related Answers

  • Cheat-Sheet Microservice Architecture

  • Microservices based Security Arch Doc Cheat Sheet¶

    0

    Threat modeling and enforcement of the principle of least privilege:

    What scopes or API keys does microservice minimally need to access other microservice APIs?

    What grants does microservice minimally need to access database or message queue?

    Data leakage analysis:

    What storages or message queues do contain sensitive data?

    Does microservice read/write date from/to specific database or message queue?

    What microservices are invoked by dedicated microservice? What data is passed between microservices?

    Attack surface analysis:

    What microservices endpoints need to be tested during security testing? 

    Popularity 1/10 Helpfulness 1/10 Language whatever
    Source: Grepper
    Link to this answer
    Share Copy Link
    Contributed on Feb 21 2023
    Pragya Keshap
    0 Answers  Avg Quality 2/10


    X

    Continue with Google

    By continuing, I agree that I have read and agree to Greppers's Terms of Service and Privacy Policy.
    X
    Grepper Account Login Required

    Oops, You will need to install Grepper and log-in to perform this action.