Thomas Südbröcker
Get started with securing your cloud-native Java microservices applications
#1about 5 minutes
Introduction to the cloud-native security workshop
An overview of the workshop's goals, the final application architecture, and the open source technologies used like Keycloak and Quarkus.
#2about 19 minutes
Implementing authentication with Keycloak, Quarkus, and JWT
A walkthrough of the authentication and authorization flow using Keycloak for identity management, Quarkus with MicroProfile for the backend, and JSON Web Tokens (JWT) for secure communication.
#3about 13 minutes
Securing the platform with an Istio service mesh
An explanation of Istio's core concepts, including the sidecar proxy model for traffic management, securing external access with TLS, and enabling internal security with mutual TLS (mTLS).
#4about 18 minutes
Setting up the IBM Cloud and Kubernetes cluster
A step-by-step guide to requesting a pre-configured Kubernetes cluster on IBM Cloud and accessing it using the integrated Cloud Shell.
#5about 21 minutes
Configuring the Istio ingress gateway with TLS
This lab demonstrates how to install Istio, expose its ingress gateway with a public DNS name, and secure it with a TLS certificate from Let's Encrypt.
#6about 6 minutes
Deploying and configuring Keycloak for identity management
Learn how to deploy Keycloak to Kubernetes and automate the creation of a security realm, users, and roles using a script and the Keycloak API.
#7about 7 minutes
Deploying the Java microservices to Kubernetes
This section covers deploying the web frontend, web API, and articles microservices to the cluster and configuring the Keycloak client with the correct redirect URI.
#8about 6 minutes
Enforcing strict mutual TLS for internal traffic
Discover how to apply an Istio policy to enforce strict mutual TLS (mTLS), preventing unauthorized internal services from directly accessing protected endpoints.
#9about 9 minutes
Implementing service-level authorization policies in Istio
Go beyond mTLS by creating Kubernetes ServiceAccounts and applying Istio AuthorizationPolicies to control which specific services are allowed to communicate with each other.
#10about 4 minutes
Visualizing traffic with Kiali and workshop summary
Use the Kiali dashboard to visualize the secured service mesh traffic and review the key application and platform security concepts covered in the workshop.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
13:39 MIN
Understanding the core components of cloud security
Building Well-Architected applications
24:44 MIN
Summary and resources for getting started with Quarkus
Test-Driven Development: It's easier than you think!
33:43 MIN
Deploying reactive apps and key takeaways
Development of reactive applications with Quarkus
39:53 MIN
Q&A on managed Kubernetes security in the cloud
Kubernetes Security - Challenge and Opportunity
33:54 MIN
Q&A on microservice architecture and security
Security Challenges of Breaking A Monolith
22:09 MIN
Centralizing security services in a Kubernetes ecosystem
DevSecOps: Security in DevOps
16:17 MIN
Building and securing the new microservices architecture
How to Destroy a Monolith?
06:17 MIN
Accelerating development with AI and security tools
30 powerful AWS hacks in just 30 minutes: Boost your developer productivity
Featured Partners
Related Videos
Keycloak case study: Making users happy with service level indicators and observability
Alexander Schwartz
Enabling automated 1-click customer deployments with built-in quality and security
Christoph Ruggenthaler
Development of reactive applications with Quarkus
Niklas Heidloff
Architecting API Security
Philippe De Ryck
What The Hack is Web App Sec?
Jackie
2021: Familiar APIs on Kickass Runtimes #slideless
Adam Bien
You can’t hack what you can’t see
Reto Kaeser
Serverless Java in Action: Cloud Agnostic Design Patterns and Tips
Kevin Dubois & Daniel Oh
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.

Java/Kotlin Software Developer (m/w/d) in einem Cloud-Native-Stack
PROSOZ Herten GmbH
Herten, Germany
Junior
Intermediate
Senior
Java
Scrum
Kotlin
Microservices


Kubernetes Lifecycle & Security Engineer / Distributed Cloud - STACKIT (gn)
Webseite STACKIT
Intermediate
Kubernetes



Senior Full-Stack Engineer (Java Quarkus/Angular, Kafka, Microservices)
Callista Group
Basel, Switzerland
Senior
Apache Kafka
Microservices

Technical Application Specialist - Kubernetes / Digital Certificates
Lloyd's
€47-53K
DevOps
Jenkins
Terraform
Kubernetes

Kubernetes Lifecycle & Security Engineer / Distributed Cloud - STACKIT
Schwarz Unternehmenskommunikation GmbH & Co. KG
Senior
Kubernetes

Java Cloud DevOps
DEVK Deutsche Eisenbahn Versicherung Sach- und HUK-Versicherungsverein AG
Remote
JUnit
DevOps