ABSTRACT

Protection is designing the defensive strategy around the assets we’ve previously identified as being sensitive. This chapter discusses the processes involved with protecting a secure system from abuse by attackers, insider threats, human or technical error, and other threats. Knowing where the edges of a system are enables the readers to implement an efficient and effective protection strategy. Each time a service or component traverses an edge, we should define the security requirements for doing so. Vulnerabilities in a monolithic system tend to have farther reaching implications due to the number of access points available to each component. This means that a security breach in a monolithic system is likely to be more severe and farther-reaching than those occurring in a microservice. Monolithic systems tend to use fewer security principals with broader authorization when compared to microservices where each component has a defined edge.