Summary
In this chapter, you learned how to strengthen the security of your micro frontend solution. You saw that embracing web standards and thinking about proper verification methods will help you mitigate most issues. While choosing the right architecture certainly yields the best possible foundation, certain limitations must also be installed in your solution.
The key point to take away from this chapter is that a solid security strategy starts with defining proper boundaries. Once you know the boundaries and potential attack vectors within these boundaries, you can outline the right takes to mitigate those risks. Always make sure to verify the origins of all assets used – especially for those that run into the user’s or your infrastructure.
In the next chapter, we will look at how to make your solution even more scalable by using a micro frontend discovery service. While we have already touched on the topic in previous chapters, such as Chapter 11, by introducing...