Facilitating the spread of knowledge and innovation in professional software development



Choose your language

InfoQ Homepage Applying a Zero Trust Model to Microservices

Applying a Zero Trust Model to Microservices


With a growing number of assets (users, devices, services) outside the corporate firewall distributed points of access, the traditional method of securing the perimeter is not enough. The concept of what is trusted must change to include a more diverse portfolio of applications, infrastructure, systems and end users both outside and inside the firewall.

This eBook outlines key concepts for evolving your security approach to address cloud-native, microservices-based environments. Learn:

  • How monoliths and microservices differ in terms of their security profiles
  • How to apply a zero trust model to microservices
  • How cloud-native application patterns - such as Envoy Proxy - can enable zero trust security
  • How to connect, secure and control with an Envoy based application network