Chapter 7. Dealing with Security
Security crosses every boundary of IT systems; from physical access to data centers and server racks, to encrypting communications, and all the way to validating inputs of web services endpoints. In this chapter, we will focus on the security measures that directly affect web services. We will cover the following topics:
- The booking component of our sample RESTful web service being used to illustrate how security concerns can be addressed with Spring
- Authentication techniques
- Authorization techniques
- Input validation
- The use of encryption