Securing Microservices and Microservice Architectures: A Systematic Mapping Study

03/16/2020
by   Abdelhakim Hannousse, et al.
0

Microservice architectures are becoming trending alternatives to existing software development paradigms notably for developing complex and distributed applications. Microservices emerged as an architectural design pattern aiming to address the scalability and ease the maintenance of online services. However, security breaches also increased threatening the availability, integrity and confidentiality of microservice-based systems. A growing body of literature is found addressing security threats and security mechanisms to individual microservices and microservice architectures. In this paper, we conduct a systematic mapping study in order to categorize threats on microservice architectures and security proposals along with their applicability levels, platforms and validation techniques. The aim of this study is to provide a helpful guide to developers about already recognized threats on microservices and how they can be detected, mitigated or prevented; we also aim to identify potential research gaps on securing microservice architectures. The systematic search yielded 1067 studies of which 47 are selected as primary studies. The results of the mapping revealed an unbalanced research focus on external attacks, authentication and authorization techniques compared with internal attacks and mitigation techniques. Additionally, we found that microservice layer is the most addressed layer in the architecture. We also found that performance analysis and case studies are the most used validation technique of security proposals.

READ FULL TEXT
research
05/01/2021

A systematic mapping study on security countermeasures of in-vehicle communication systems

The innovations of vehicle connectivity have been increasing dramaticall...
research
08/25/2023

Mitigation Techniques for Cyber Attacks: A Systematic Mapping Study

In the wake of the arrival of digital media, the Internet, the web, and ...
research
12/10/2022

A systematic literature review on insider threats

Insider threats is the most concerned cybersecurity problem which is poo...
research
09/04/2020

Authentication and authorization in microservice-based systems: survey of architecture patterns

Context. Service-oriented architecture and its microservice-based approa...
research
11/30/2018

Security Patterns: A Systematic Mapping Study

Security patterns are a means to encapsulate and communicate proven secu...
research
11/01/2021

Confidentiality and Integrity Mechanisms for Microservices Communication

The microservices architecture tries to deal with the challenges posed b...
research
07/12/2021

Formal Methods in Railways: a Systematic Mapping Study

Formal methods are mathematically-based techniques for the rigorous deve...

Please sign up or login with your details

Forgot password? Click here to reset