-
Logo at https://upload.wikimedia.org/wikipedia/commons/7/79/Spring_Boot.svg
-
[Defence in depth](https://techbeacon.com/8-best-practices-microservices-security) principle requires a protection layer between containers running separate microservers, even being deployed in the sa…
-
How are ports protected?
-
### Application contact emails
atul@sgnl.ai, erik@sgnl.ai, chiranjeewee@sgnl.ai
### Project Summary
Assure identity and context in microservices call chains
### Project Description
Trat…
-
From LC: This is a new concept topic for an introduction to securing microservices- authentication and authorization in securing cloud-native microservices. Jakarta EE Security provides the capability…
-
Since there is a lack of samples on how to secure microservices and this is the most suggested method, it could be a good idea to implement this type of security for communication between microservice…
ghost updated
9 months ago
-
## Product Outline
[Link](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/platform/product-management/product-outline-template.md)
## Summary
This epic captures our strategi…
-
Hi @KodrAus
Although fault tolerance requires that each microservice writes to its own database tables, in practice this requirement is often violated.
The implementation of UUIDv7 for PostgreSQ…
-
### Issue Summary:
Spinnaker microservices docker containers are running Alpine version 3.16.3 or Ubuntu bionic distro 18.04 which are already EOL versions causing potential security vulnerabilitie…
-
Although fault tolerance requires that each microservice writes to its own database tables, in practice this requirement is often violated.
The implementation of UUIDv7 for PostgreSQL had to switch…