Best Practices for Securing Cloud Native Applications

Track: Security
Microservices are the foundation for building your application in the cloud and, just like with legacy applications, security is of the upmost importance. How do you properly secure a Microservice created for the Jakarta Enterprise Edition or MicroProfile specifications? What are some best practices for authenticating users and authorizing them to access your MicroService? Join me for an overview of Microservice security, with samples based on the Open Liberty application server.
Mark Stoodley
Mark joined the IBM Markham lab in 2002 after graduating from the University of Toronto with a Ph.D. focusing on the field of computer engineering. He spent his entire IBM career in the Runtime Technologies (formerly Java Technology Center) team developing, testing, servicing, and now architecting Just-In-Time (JIT) compilers. Mark led the J9 Java Virtual Machine team through the effort to significantly refactor and then to contribute millions of lines of J9 source code to two open projects : Eclipse OMR and Eclipse OpenJ9. Following this successful effort, he became the Chief Architect for IBM Java, leading a global team that builds, innovates in, and services the IBM Semeru Runtime (JDK) for thousands of Java-based products and cloud services used by small, medium, large, and huge companies spanning all sectors of the IT industry.