Summary
In this chapter, we covered two important topics regarding microservice development: security and regulatory compliance. Both areas are especially important in microservice environments where services may transfer and access various types of data independently, increasing the scope of potential security risks (generally, the more complex the system is, the more security risks there are). In the first part of this chapter, you learned how to establish secure communication between your microservices with TLS, perform JWT-based authentication and authorization, analyze your Go microservice code to identify security issues, and scan service dependencies for known software vulnerabilities. In the second part of this chapter, we briefly covered common compliance regulations that might be relevant to microservice development and outlined a simple framework for assessing and addressing compliance requirements.
In the next chapter, we are going to cover another practically important...