
Enhancing microservices’ security and mitigating risks associated with SSRF attacks
Overview
Industry
Location
Telecom
Poland
Technology Used
Java
JSON Web Token
Kubernetes
Spring Boot
We'd love to hear from you!
Fill out the form - we'll get back to you as soon as possible
More case studies
FAQ
How does the system enforce service invocation restrictions, port scanning detection and prevention of alternate file syntaxes?
The solution enforces these measures through its OAuth 2.0 and JWT-based authentication and authorization layer. This layer provides authentication enforcement across all microservices and a declaratively configurable matrix. This matrix specifically addresses SSRF vulnerabilities by enforcing IP restrictions (service invocation), detecting and containing internal port scanning, and preventing the use of alternative file syntaxes for server file downloads.