Answers
Here are the answers to this chapter’s questions:
- The complexity increases the attack surface. Each service, its communication channel, and even the orchestrator can be potential points of failure or exploitation. Therefore, each element needs to be individually secured, requiring sophisticated access control mechanisms.
- Each individual microservice is a lightweight component with a minimal attack surface, thanks to its simplicity. With fewer lines of code and fewer dependencies, the attack surface for each individual microservice is reduced. Additionally, the ephemeral nature of containers means that even if a container is compromised, it is less likely to be a persistent threat.
- Identity tokens, commonly in the form of JWT, securely represent user information between multiple parties. In a microservices architecture, these tokens are crucial for securely propagating identity and claims between downstream services, aiding in both auditing and fine-grained...