Bird
0
0

You are designing a microservices system handling sensitive user data. Which combination of security practices ensures comprehensive protection across all services?

hard📝 Conceptual Q15 of 15
Microservices - Authentication and Authorization
You are designing a microservices system handling sensitive user data. Which combination of security practices ensures comprehensive protection across all services?
AAuthentication and authorization in each service, encryption in transit and at rest, and distributed auditing.
BAuthentication at gateway, no encryption inside services, centralized auditing.
CNo authentication, encryption only at database, auditing only on gateway.
DAuthentication only in some services, no authorization, encryption only in transit.
Step-by-Step Solution
Solution:
  1. Step 1: Identify key security components

    Authentication and authorization must be enforced in every service to verify identity and permissions.
  2. Step 2: Ensure data protection and monitoring

    Encryption protects data both moving and stored; auditing across services tracks actions for accountability.
  3. Step 3: Evaluate options

    Authentication and authorization in each service, encryption in transit and at rest, and distributed auditing. covers all these best practices; others miss critical elements like authorization or encryption.
  4. Final Answer:

    Authentication and authorization in each service, encryption in transit and at rest, and distributed auditing. -> Option A
  5. Quick Check:

    Complete security coverage = A [OK]
Quick Trick: Secure identity, data, and logs everywhere [OK]
Common Mistakes:
MISTAKES
  • Relying only on gateway security
  • Skipping authorization checks
  • Ignoring encryption at rest or auditing

Want More Practice?

15+ quiz questions · All difficulty levels · Free

Free Signup - Practice All Questions
More Microservices Quizzes