Service A hashes a message using algorithm X. which creates message digest X1. Service B uses a different algorithm Y to create message digest Y1 of the same message. Which of the following statements are true regarding the comparison of X1 and Y1?
Which of the following are valid security considerations specific to the application of the Service Autonomy principle?
The messages exchanged between two services are kept confidential by using symmetric encryption. The security specialist is quite strict about making sure that no attacker is able to intercept and decipher messages sent between these two services. As a result, periodic audits are conducted in order to ensure that shared keys are always kept confidential. A single shared key has been in use for quite some time now. The security specialist was confident that all keys were well guarded, but just recently their security was compromised. How is this possible given that the shared key was never lost?
Service A contains a service capability that runs a complex mathematical function, which results in runtime failure if invalid input values are supplied by a service consumer. Security needs to be added so that it can be verified that message content received by Service A has not been altered since the message was sent by a legitimate service consumer. Which pattern needs to be applied to fulfill this security requirement?
A service that was previously using a shared identity store is now given its own dedicated identity store instead. What are the likely impacts (positive or negative) that will result from this change?