Visão Geral
API Security and Governance with Kong for Regulated Environments. Este curso aprofunda a segurança e governança de APIs com Kong em ambientes regulados, abordando requisitos técnicos e operacionais exigidos por normas como LGPD, Open Banking, PCI-DSS e ISO 27001. Os participantes aprenderão a projetar, implementar e operar APIs seguras, auditáveis e governadas, aplicando controles de acesso, criptografia, rastreabilidade, segregação de responsabilidades e políticas de compliance utilizando o Kong API Gateway em ambientes on-premises, cloud e Kubernetes.
Conteúdo Programatico
Module 1: Regulatory and Compliance Foundations
- LGPD, PCI-DSS, and Open Banking overview
- Regulatory requirements for APIs
- Data classification and protection
- Shared responsibility model
Module 2: Secure API Architecture with Kong
- Secure API design principles
- Zero Trust architecture
- Control plane and data plane security
- Multi-tenant architecture considerations
Module 3: Strong Authentication and Authorization
- OAuth 2.0 and OpenID Connect flows
- Mutual TLS (mTLS) implementation
- JWT validation and claims enforcement
- Fine-grained access control
Module 4: Data Protection and Cryptography
- TLS configuration and hardening
- Certificate lifecycle management
- Encryption in transit and at rest
- Protecting sensitive payloads
Module 5: Traffic Control and Abuse Protection
- Rate limiting for regulated APIs
- Quotas and consumer segmentation
- Anti-abuse and threat mitigation
- API firewall concepts
Module 6: Governance and Policy Enforcement
- API standards and lifecycle governance
- Versioning and deprecation policies
- Policy enforcement using plugins
- Organizational governance models
Module 7: Auditing, Logging, and Traceability
- Audit trails and compliance logs
- Request and response logging strategies
- Correlation IDs and traceability
- Evidence generation for audits
Module 8: Security and Compliance on Kubernetes
- Kong security in Kubernetes environments
- Secrets management and RBAC
- Network policies and isolation
- Secure ingress patterns
Module 9: DevSecOps and Continuous Compliance
- Security as code concepts
- CI/CD security checks
- Automated policy validation
- Continuous compliance monitoring
Module 10: Incident Response and Best Practices
- Security incident scenarios
- API breach response workflows
- Post-incident analysis
- Production security best practices