Visão Geral
Este Curso API Security and Governance with Kong, aborda de forma aprofundada segurança e governança de APIs utilizando o Kong API Gateway, com foco em ambientes corporativos e cloud-native. Os participantes aprenderão a proteger APIs contra acessos não autorizados, abusos e ameaças, além de definir políticas de governança, conformidade e padronização ao longo do ciclo de vida das APIs. O treinamento cobre autenticação, autorização, criptografia, controle de tráfego, auditoria e boas práticas para ambientes regulados.
Conteúdo Programatico
Module 1: API Security and Governance Fundamentals
- API threat landscape
- Security and governance principles
- Zero Trust for APIs
- Compliance and regulatory requirements
Module 2: Kong Security Architecture
- Kong security model
- Control plane and data plane security
- Plugin-based security
- Kong Enterprise security features
Module 3: Authentication and Authorization
- Key authentication
- JWT authentication
- OAuth 2.0 and OpenID Connect
- Access control lists (ACLs)
Module 4: Transport Security and Encryption
- TLS and HTTPS configuration
- Certificate management
- Mutual TLS (mTLS)
- Secure service-to-service communication
Module 5: Traffic Protection and Abuse Prevention
- Rate limiting strategies
- Quotas and throttling
- Bot and abuse mitigation
- API firewall concepts
Module 6: API Governance and Policy Enforcement
- API standards and policies
- Versioning and lifecycle governance
- Multi-team and multi-tenant governance
- Policy enforcement with plugins
Module 7: Auditing, Logging, and Compliance
- Audit logging
- Request and response logging
- Compliance reporting
- Data privacy considerations
Module 8: Security in Kubernetes Environments
- Kong security on Kubernetes
- Ingress and Gateway API security
- Network policies
- Secrets management
Module 9: DevSecOps and CI/CD Integration
- Security automation concepts
- Policy as code
- CI/CD pipeline integration
- Continuous compliance
Module 10: Best Practices and Real-World Scenarios
- Secure API design patterns
- Common security misconfigurations
- Incident response scenarios
- Production security best practices