{"id":16988,"date":"2017-06-24T02:23:49","date_gmt":"2017-06-23T17:23:49","guid":{"rendered":"https:\/\/jirak.net\/wp\/secure-practices-for-microservices-dev-and-ops\/"},"modified":"2017-06-24T02:35:14","modified_gmt":"2017-06-23T17:35:14","slug":"secure-practices-for-microservices-dev-and-ops","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/secure-practices-for-microservices-dev-and-ops\/","title":{"rendered":"Secure Practices for Microservices \u2013 Dev and Ops"},"content":{"rendered":"<p>Secure Practices for Microservices \u2013 Dev and Ops<\/p>\n<p>Owen Garrett, Head of Product at NGINX, is <a href=\"http:\/\/searchmicroservices.techtarget.com\/feature\/Divvying-up-must-do-secure-application-development-list-for-dev-and-ops\" target=\"_blank\">interviewed<\/a> in the TechTarget Microservices channel about best practices for secure application development and deployment with microservices. <\/p>\n<p>A few interesting quotes:<\/p>\n<ul>\n<li>\u201c\u2026all incoming input\u2026 it\u2019s potentially attack traffic.\u201d<\/li>\n<li>\u201c&#8230;build the application so that it&#8217;s very defensive in the way that it handles requests.\u201d<\/li>\n<li>&#8220;For ops, good practices include deploying a load balancer or reverse proxy devices with security scanners&#8230;\u201d<\/li>\n<li>\u201cIt&#8217;s a very different security situation with microservices for a couple of reasons.&#8221;<\/li>\n<\/ul>\n<p>For the full story, visit <a href=\"http:\/\/searchmicroservices.techtarget.com\/feature\/Divvying-up-must-do-secure-application-development-list-for-dev-and-ops\" target=\"_blank\">TechTarget<\/a>. <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.nginx.com\/blog\/51093\/\">Secure Practices for Microservices &#8211; Dev and Ops<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.nginx.com\">NGINX<\/a>.<\/p>\n<p>Source: <a href=\"https:\/\/www.nginx.com\/blog\/51093\/\" target=\"_blank\">Secure Practices for Microservices \u2013 Dev and Ops<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Secure Practices for Microservices \u2013 Dev and Ops Owen Garrett, Head of Product at NGINX, is interviewed in the TechTarget Microservices channel about best practices for secure application development and deployment with microservices. A few interesting quotes: \u201c\u2026all incoming input\u2026 it\u2019s potentially attack traffic.\u201d \u201c&#8230;build the application so that it&#8217;s very defensive in the way that it handles requests.\u201d &#8220;For ops, good practices include deploying a load balancer or reverse proxy devices with security scanners&#8230;\u201d \u201cIt&#8217;s a very different security situation with microservices for a couple of reasons.&#8221; For the full story, visit TechTarget. The post Secure Practices for Microservices &#8211; Dev and Ops appeared first on NGINX. Source: Secure Practices for Microservices \u2013 Dev and Ops<\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[169],"tags":[652],"class_list":["post-16988","post","type-post","status-publish","format-standard","hentry","category-news","tag-nginx"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/16988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=16988"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/16988\/revisions"}],"predecessor-version":[{"id":16989,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/16988\/revisions\/16989"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=16988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=16988"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=16988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}