Part 5: Securing service-to-service call chain

 

We’ve reached the final part of this book. Up to now, you’ve learned how to use cryptography, build trust with certificates and TLS, and authenticate users with modern identity protocols. But securing applications doesn’t stop at users. In large systems, the real challenge is keeping the services themselves honest — proving who they are, and making sure they can only do what they’re allowed to do.

In this part, we’ll look at service identity (chapter 16), the foundation for secure service-to-service communication in a zero-trust world. Then we’ll turn to authorization at scale (chapter 17), exploring RBAC, ABAC, and ReBAC — and how to choose the right model for your architecture without drowning in complexity.

This closing part ties everything together. By the end, you’ll have the tools to secure not just users, but the services and workflows that make up modern cloud-native systems. It’s a fitting way to conclude our journey: from understanding the math behind cryptography all the way to building systems that stay secure at scale.