Complete the code to identify the primary security layer in microservices.
The first line of defense in microservices security is the [1].
The API gateway acts as the primary security layer by managing and securing traffic between clients and microservices.
Complete the code to specify the common authentication method used in microservices.
Microservices often use [1] tokens for stateless authentication.
JWT (JSON Web Token) is commonly used for stateless authentication in microservices because it carries user identity securely.
Fix the error in the statement about securing communication between microservices.
All communication between microservices should use [1] to ensure data privacy.TLS (Transport Layer Security) encrypts data in transit, ensuring privacy and security between microservices.
Fill both blanks to complete the security best practice for microservices.
Use [1] to verify user identity and [2] to control access to resources.
Authentication verifies who the user is, while authorization controls what the user can access.
Fill all three blanks to complete the microservices security architecture components.
Secure microservices use [1] for identity, [2] for encrypted communication, and [3] to monitor suspicious activity.
An identity provider manages user identities, TLS encrypts communication, and logging helps detect security issues.