This post highlights the importance of being aware that even if best security practices are followed, microservices will still be vulnerable. It suggests that instead of trying to create completely invulnerable services, organizations should acknowledge that their services are vulnerable and focus on protecting them from exploitation.
The post suggests that monitoring the behavior of both clients and services can help detect and block exploits against vulnerabilities. By combining these two approaches, the likelihood of successful exploitation of vulnerabilities can be decreased. The post mentions four different stages in the life of a service from a security standpoint where security-behavior monitoring is necessary:
- Normal state with no known vulnerabilities,
- Vulnerability discovery,
- Vulnerability exploitation,
- Exploitation remediation.















