Artifact Peer Review

Best Practices in Implementing a Secure Microservices Architecture
Best Practices in Implementing a Secure Microservices Architecture

Best Practices in Implementing a Secure Microservices Architecture

Application containers and a microservices architecture are being used to design, develop, and deploy applications leveraging agile software development approaches such as Development Operations. Security needs to be embedded into these software development approaches. This document serves to identify best practices in securing microservices in the engineering of trustworthy secure systems through the lens of the Developer, Operator, and Architect.

Peer Review Contribution


Address Information
 

Having read and understood the CSA’s Privacy Policy,

I specifically consent to receive marketing messages via the following channels:

Open Until: 10/16/2019