Securing Microservices and Microservice Architectures
Securing Microservices and Microservice Architectures
Review article
article info a b s t r a c t
Article history: Microservice architectures (MSA) are becoming trending alternatives to existing software development
Received 21 June 2020 paradigms notably for developing complex and distributed applications. Microservices emerged as
Received in revised form 4 May 2021 an architectural design pattern aiming to address the scalability and ease the maintenance of
Accepted 16 June 2021
online services. However, security breaches have increased threatening availability, integrity and
Available online 27 June 2021
confidentiality of microservice-based systems. A growing body of literature is found addressing security
Keywords: threats and security mechanisms to individual microservices and microservice architectures. The
Microservices aim of this study is to provide a helpful guide to developers about already recognized threats on
Microservice architectures microservices and how they can be detected, mitigated or prevented; we also aim to identify potential
Security research gaps on securing MSA. In this paper, we conduct a systematic mapping in order to categorize
Systematic mapping threats on MSA with their security proposals. Therefore, we extracted threats and details of proposed
solutions reported in selected studies. Obtained results are used to design a lightweight ontology
for security patterns of MSA. The ontology can be queried to identify source of threats, security
mechanisms used to prevent each threat, applicability layer and validation techniques used for each
mechanism. The systematic search yielded 1067 studies of which 46 are selected as primary studies.
The results of the mapping revealed an unbalanced research focus in favor of external attacks; auditing
and enforcing access control are the most investigated techniques compared with prevention and
mitigation. Additionally, we found that most proposed solutions are soft-infrastructure applicable layer
compared with other layers such as communication and deployment. We also found that performance
analysis and case studies are the most used validation techniques of security proposals.
© 2021 Elsevier Inc. All rights reserved.
Contents
1. Introduction......................................................................................................................................................................................................................... 2
2. Background.......................................................................................................................................................................................................................... 2
2.1. Microservice architectures .................................................................................................................................................................................... 2
2.2. Systematic mapping .............................................................................................................................................................................................. 3
3. Related work ....................................................................................................................................................................................................................... 3
4. Research methodology ....................................................................................................................................................................................................... 4
4.1. Research objectives................................................................................................................................................................................................ 4
4.2. Research questions ................................................................................................................................................................................................ 4
4.3. Search process........................................................................................................................................................................................................ 4
4.4. Study selection process ......................................................................................................................................................................................... 5
4.5. Inclusion and exclusion criteria ........................................................................................................................................................................... 5
4.6. Quality assessment ................................................................................................................................................................................................ 5
4.7. Data extraction process......................................................................................................................................................................................... 6
4.8. Data synthesis ........................................................................................................................................................................................................ 6
5. Results of the mapping...................................................................................................................................................................................................... 6
5.1. Overview of selected studies................................................................................................................................................................................ 6
5.2. MSA security threats (RQ1) .................................................................................................................................................................................. 8
∗ Corresponding author.
E-mail addresses: [email protected] (A. Hannousse), [email protected] (S. Yahiouche).
https://doi.org/10.1016/j.cosrev.2021.100415
1574-0137/© 2021 Elsevier Inc. All rights reserved.
A. Hannousse and S. Yahiouche Computer Science Review 41 (2021) 100415
can easily be deployed, replicated, replaced, and destroyed inde- from primary papers are visualized, results are interpreted, re-
pendently without affecting systems availability. Moreover, im- search questions are answered and the mapping is validated and
plementing a single business capability per microservices allows documented. Fig. 2 depicts the overall process for conducting
their use in different applications and application domains. The systematic mapping studies as proposed in [8]. The quality as-
main characteristics that differentiate microservices architectural sessment step is depicted in Fig. 2 within a dashed line box since
style from monolithic and its ancestor service-oriented architec- it is optional as stated in [6,8].
tures is the smaller size, scalability and independence of each unit
constituting a system. 3. Related work
Microservices are getting more attention and becoming
adopted in industry. Currently, microservices are used by widely We found in the literature several secondary studies (sys-
recognized companies such as Coca Cola, Amazon, eBay and tematic reviews or mappings) dedicated to investigate the state-
NetFlix. Specifically, microservices are becoming more popular in of-the-art of MSA in general. Surprisingly, few works are found
software and IT service companies [5]. focusing on security aspects in MSA. All found studies, except
Although the advantages brought by adopting microservice the work of Vale et al. [9], are either platform or technology
architectures in developing complex systems, security is one of dependent investigations.
the serious challenges that need to be tackled. Thus, there is an Vale et al. [9] conducted a similar investigation to our study.
urgent need to identify and check current trends in overcoming They conducted a systematic mapping to reveal adopted security
security challenges in microservice architectures which is the aim mechanisms for microservice-based systems. The study exam-
of the present paper. ined 26 papers published from November 2018 to March 2019.
Vale et al. [9] focused only on security mechanisms and cate-
2.2. Systematic mapping gorized the 18 identified mechanisms according to their focus,
and classified validation techniques according to their nature. The
A systematic mapping is a kind of evidence-based software study revealed that (1) authentication and authorization are the
engineering (EBSE) [6]. The aim of a systematic mapping is to most frequently adopted mechanisms for securing microservices,
provide an overview of a research area by building a classification (2) case studies and experiments are the most validation tech-
scheme and structuring evidences on a research field. niques used for security proposals, (3) absence of patterns for
Peterson et al. [7,8] has proposed an overall process for the microservices-based systems security. Our study is broader and
elaboration of systematic mappings. The process is composed of improves Vale et al. [9] work in several ways. In this study we
three main steps: planning, conducting and reporting. By planning, include published papers since 2011. Moreover, besides security
one can start by justifying the need and scope of the mapping, mechanisms, we also focus on identifying security threats and
formulate the set of research questions, develop and validate a the applicability of proposed solutions regarding their execution
protocol specifying all the decisions relevant to conducting the platforms and architectural layers.
mapping. The protocol includes the identification of search terms, Yu et al. [10] presented a survey on security in microservice-
search strategy, literature sources that need to be used to retrieve based fog applications. The survey included papers published
relevant papers, how and in which base found papers are selected between 2010 and 2017. The focus of Yu et al. [10] was domain
and included in the mapping, what data need to be extracted specific; they focused on determining security challenges and
from selected papers and how extracted data are synthesized and potential solutions of adopting microservices in fog computing.
classified. By conducting, the initially validated protocol from the The security issues identified by the study concerns containers,
planning step is executed; thus, the identified sources are used to data, and network vulnerabilities. They also proposed a solution
retrieve papers, found papers are examined for relevance; useful for inter-service communication in fog applications.
data are then extracted from admitted papers and extracted Monteiro et al. [11] identified a set of elements related to
data are synthesized and classified. By reporting, extracted data microservices implementation in cloud computing. They reported
3
A. Hannousse and S. Yahiouche Computer Science Review 41 (2021) 100415
the same security aspects discussed by Yu et al. [10]. They con- of found papers, propose or use an existing classification scheme,
cluded that availability and trustworthiness are the two major data extraction and studies mapping. In the sequel, we describe
security requirements in MSA. the details of each step.
Nkomo et al. [12] conducted a systematic review on prac-
tices that can be incorporated into the development process 4.1. Research objectives
of microservice-based systems. The focus of Nkomo et al. [12]
was to propose general guidelines where security can be tackled The adoption of microservice architectures in developing high-
earlier when developing microservice-based applications putting sensitive systems such as industry, raises a question on the risks
much emphasis on microservices composition. They ended up associated with the deployment of microservices in distributed
with five security-focused development activities: (1) identify and highly accessible platforms. In this study, we aim to iden-
security requirements of microservice composition, (2) adopt se- tify the threats which could target individual microservices and
cure programming best practices, (3) validate security require- microservice architectures and may endanger systems’ security,
ments and secure programming best practices, (4) secure con- stability and reliability. Moreover, we aim to collect and catego-
figuration of runtime infrastructure, and (5) continuously mon- rize all known threats and the endeavors to mitigate and prevent
itor the behavior of microservices. Considering security as a pri- them in easy-to-handle, reliable and extensible structures such
mary concern throughout the life-cycle of microservice-based as ontology. This enables: (1) researchers and practitioners to
systems is mandatory; however, experiences show that all se- have an overview of the risks that could threaten their existing
curity threats cannot be identified earlier especially with the or future systems and (2) share experiences on how to mitigate
continuous evolving of technologies. and prevent already recognized security threats. To sum up, the
Sultan et al. [13] presented a survey on the security of con- objectives of this research can be reformulated as follows:
tainers; they identified main threats due to images, registries, O1. identify and categorize threats targeting individual mi-
orchestration, containers themselves, side channels and host OS
croservices and microservice architectures.
risks. They distinguished two kinds of solutions to containers
O2. recognize and categorize the endeavors to detect, mitigate
security: software-based and hardware-based solutions without
and prevent recognized security threats.
further investigation of proposed solutions. Belair et al. [14] com-
O3. discern the set of validation techniques and tools used to
plements the work of Sultan et al. [13] by proposing a taxonomy
corroborate identified security mechanisms.
for containers’ security proposals. Belair et al. [14] focused on se-
O4. deduce and share a lightweight ontology for securing
curity solutions at the infrastructure level putting much empha-
microservice based systems.
sis on data transmission through virtualization. Three categories
were identified: configuration-based, code-based and rule-based
4.2. Research questions
defense. They reported the fact that Linux security model (LSM),
the powerful defense framework targeting Linux, cannot be easily
adapted to containers to improve security. The aim of this study is to identify the set of security vul-
Compared with the works of Yu et al. [10] and Monteiro nerabilities and how they can be tackled in microservice-based
et al. [11], our study is domain and platform independent and systems. Thus, we formulate our research questions in light of
includes more recent endeavors with broader focus on proposed the aims of our study and following the guidelines of Kuhrmann
solutions to security threats. Compared with the works in [13] et al. [16]. This study is conducted with five main questions
and [14], we focus in our study on security issues concerning MSA in mind. These questions are described in Table 1 with their
in general and not only containers. corresponding motivation and related objectives.
In this section we present the details of the protocol adopted Search string used in this study is designed to be generic
for conducting this mapping study. Following the guidelines of and simple. It is constructed based on search terms concerned
Peterson et al. [7] and Felderer and Craver [15], a systematic with population and intervention as suggested by Petticrew and
mapping study should include the following primary steps: a defi- Roberts in [17]. Population refers to the application area which is
nition of research questions, search for relevant papers, screening microservices and microservice architectures where intervention
4
A. Hannousse and S. Yahiouche Computer Science Review 41 (2021) 100415
Table 1
Research questions with their motivations and relevant objectives.
No Research Question Main Motivation Objectives
RQ1 What are the most addressed security threats, This research question distinguishes the list of O1, O4
risks, and vulnerabilities of microservices and mostly treated vulnerabilities from those
microservice architectures and how they can needing further investigations.
be classified?
RQ2 What are existing approaches and techniques This research question provides an overview of O2, O4
used for securing microservices and existing approaches and techniques used for
microservice architectures and how they can securing microservice-based systems.
be classified?
RQ3 At what level of architecture the proposed This research question indicates where O2, O4
techniques and approaches are applicable for security is applied highlighting the less
securing microservices? focused levels of microservice architectures.
RQ4 What domains or platforms are the focus of This research question shows whether the O2, O4
existing solutions for securing microservices focus of the proposed solutions is platform
and microservice architectures? specific or platform independent.
RQ5 What kind of evidence is given regarding the This research question evaluates the maturity O3
evaluation and validation of proposed of existing security techniques highlighting the
approaches and techniques for securing set of empirical strategies used to validate
microservices and microservice architectures? proposed solutions.
Table 4 Table 6
Quality assessment criteria. Number of studies returned by each repository.
ID Criteria Score Repository Search results
QA1 Does the study clearly address any of security Yes/No IEEE Xplorer 50
issues in microservice architectures? ACM Digital Library 46
QA2 Does the study present a clear solution to any {0, 0.5, 1} SpringerLink 678
security threat in microservice architectures? ScienceDirect 255
QA3 Has the study been cited by other articles? {0, 1} Wiley Online Library 38
QA4 Has the study been published in ranked {1, 0.5, 0} Total 1067
journal or conference proceedings
Table 5
Data extraction form.
ID Data item Description RQ
D1 Study ID first author name + year
D2 Year year of the publication
D3 Source source of the publication
D4 Type conference or journal paper
D5 Category analysis, solution proposal or case study
D6 Threats addressed security threats RQ1
D7 Source of Threats internal or external RQ1
D8 Solution type general protection measures, framework, technique, tool or methodology proposal RQ2
D9 Security mechanisms set of security mechanisms proposed or used in the study RQ2
D10 Applicability level architectural level where the security mechanism is applied RQ3
D11 Validation method verification and validation techniques used to check the feasibility of the proposed solution RQ5
D12 Domain/Platform domains or platforms applicable for the proposed solution RQ4
6
A. Hannousse and S. Yahiouche Computer Science Review 41 (2021) 100415
Table 7
List of selected studies with their quality assessment score: C: Conference paper,
J: Journal paper, A: Automatic search, S: Snowballing.
ID Cite Year Type Publisher Search type Score
p1 [12] 2019 C Springer A 3
p2 [24] 2018 C Springer A 3
p3 [25] 2020 C Springer A 3
p4 [26] 2017 C Springer A 4
p5 [27] 2017 C Springer A 3
p6 [28] 2018 C Springer A 3
p7 [29] 2019 C Springer A 3
p8 [30] 2018 C IEEE A 3
p9 [31] 2018 C IEEE A 3
p10 [32] 2018 C IEEE A 4
p11 [33] 2016 C IEEE A 3
p12 [34] 2015 C IEEE A 3.5
p13 [35] 2018 C IEEE A 2
p14 [36] 2017 C IEEE A 4
p15 [37] 2017 C IEEE A 4
p16 [38] 2016 C IEEE A 3
p17 [1] 2018 C IEEE A 4
p18 [39] 2018 C IEEE A 3
p19 [40] 2019 J IEEE A 4
p20 [41] 2019 C IEEE A 3.5
p21 [42] 2019 C IEEE A 3
p22 [43] 2018 C IEEE A 4
p23 [44] 2018 C IEEE A 3
p24 [45] 2019 J IEEE A 4
p25 [46] 2017 C IEEE S 3
p26 [47] 2018 C IEEE S 4
p27 [48] 2019 J IEEE S 3
p28 [49] 2016 J IEEE S 4
p29 [50] 2019 J JSW S 3
p30 [51] 2017 J IOP S 3
p31 [52] 2019 C CITRENZ S 2
p32 [53] 2018 J IJERT S 3
p33 [54] 2019 J IASKS S 3
p34 [55] 2018 C Springer A 2
p35 [56] 2019 C ACM A 2
p36 [57] 2017 C ACM A 3
p37 [58] 2018 C ACM A 3
p38 [59] 2018 C ACM A 4
p39 [60] 2019 C ACM A 4
p40 [61] 2019 C ACM A 4
p41 [62] 2019 C ACM A 4
Fig. 3. Paper selection process. p42 [63] 2019 C ACM A 3
p43 [64] 2019 J Science Direct A 4
p44 [65] 2018 J Science Direct A 3
Following the guidelines of Kuhrmann et al. [16], we also p45 [66] 2019 J Science Direct A 3
experienced the use of Word Clouds to analyze the appropri- p46 [67] 2019 J Science Direct A 4
ateness of our result set of primary studies. Fig. 5 illustrates
the most frequent words used in selected papers based on their
titles and abstracts. The Figure shows that the most used words service. Attacks, vulnerabilities and risks are rarely used in titles
are microservice, security, application, architecture, system and and abstracts.
7
A. Hannousse and S. Yahiouche Computer Science Review 41 (2021) 100415
Table 8
MSA security threats per category.
Threats Percentage Studies
User-based Attacks 58.70%
Brute Force Attack 4.35% [50,52]
Cross-Site Request Forgery (CSRF) 13.00% [28,29,50,52,55,57]
Spoofing 4.35% [28,47]
Malicious Insider 4.35% [29,45]
Unauthorized Access 50.00% [12,25,28–31,33,35–37,43,46,47,50–53,58–60,64–66]
Violate non-repudiation 2.17% [24]
• Access Control - Authorization: techniques used to check 5.3.1. Microservice security application levels (RQ3)
users’ permissions for accessing specific MSA resources or The adoption of MSA as an architectural design of distributed
data. applications introduces security vulnerabilities in different archi-
• Auditing: techniques applied at runtime for discovering se- tectural layers. Thus, security measures need to be taken in every
curity gaps and may: (1) subsequently initiate appropriate layer of MSA. In this study, we distinguish the following layers:
measures or (2) simply report security breaches to relevant
• Microservice: Individual microservices are the mainstays of
supervisory authority.
MSA, those microservices can be blocked or compromised
• Mitigation: techniques that limit the damage of attacks when through injection of malicious code. Thus, security measures
they appear. Mitigation techniques can be integrated into to adopt only trusted microservices and protect them from
existing microservice-based systems. internal and external attacks need to be taken.
• Prevention: techniques that try to stop attacks from hap- • Composition: Connections among microservices can be bro-
pening in the first place. Prevention techniques need to be ken. Moreover, compromising a single microservice may
considered when developing new microservice-based sys- affect the security of the whole system due to the in-
tems. secure configuration options for individual microservices,
their locations and inter-connections. Several security mea-
Table 9 shows the list of proposed solutions mapped into our sures need to be taken at this level to secure the overall
classification with the proportion rate for each proposal with architecture of microservice-based systems.
respect to the total set of primary studies. The results show that • API: Finely tuned attacks on APIs can bypass traditional se-
much emphasis is put on proposing auditing techniques (43.48%), curity measures provided by API gateways. Hence, assets can
enforcing authentication and/or authorization (39.13%2 ), and pre- be accessed and controlled by malicious users. Appropriate
vention (34.78%), where less attention is being paid to mitigation security measures should be taken at API gateways to avoid
(10.87%). such vulnerabilities.
• Communication: Data exchanged between microservices
through event-buses can be intercepted and altered by ma-
2 This value is calculated by collecting all the papers from authorization licious insiders. Thus, securing communication channels be-
and/or authentication categories and removing duplicates; the obtained number tween microservices is mandatory for securing microservice-
is divided by the total number of papers. based systems.
9
A. Hannousse and S. Yahiouche Computer Science Review 41 (2021) 100415
Table 9
MSA security mechanism per category.
Security Mechanisms Percentage Studies
Authentication 28.26%
Centralized Access Control Manager 6.52% [29,33,37]
Certificates 6.52% [12,28,47]
Open ID 6.52% [30,48,59]
Single Sign On (SSO) 4.35% [30,51]
White-list HTTP/IP 4.35% [12,53]
HIP exchange protocol 2.17% [37]
J-PAKE protocol 4.35% [54,65]
Distribute sessions 2.17% [51]
HTTP signatures 2.17% [53]
Authorization 21.74%
Attribute Based Access Control (ABAC) 2.17% [33]
Role Based Access Control (RBAC) 6.52% [29,54,59]
R/W Permission to message broker 2.17% [12]
OAuth 2 17.39% [29,30,33,48,50,52,53,59]
Auditing 43.48%
Continuous monitoring 34.78% [1,24,25,27,32,34,42–44,48,55–57,60,62,66]
Scan container images 2.17% [12]
Static/Dynamic code analysis 8.70% [28,49,60,67]
Machine learning 6.52% [32,43,56]
Intrusion detection 4.35% [1,48]
Mitigation 10.87%
Roll-back/Restart microservices 2.17% [1]
Scale up/down N-variant microservices 2.17% [1]
Short-lived tokens 2.17% [29]
Diversification 4.35% [1,39]
IP shuffling 2.17% [40]
Live migration 4.35% [40,42]
Deception 2.17% [42]
Isolation of suspicious microservices 2.17% [1]
Prevention 34.78%
Blockchain technology 4.35% [31,35]
Encryption 10.87% [1,24,37,46,64]
Hardware Security Module (HMS) 2.17% [28]
Least privilege 2.17% [28]
No shared memory access 2.17% [28]
Proper design 6.52% [38,41,61]
Secure languages 4.35% [28,58]
Smart contracts 6.52% [31,33,35]
TLS protocol 6.52% [26,28,36]
SGX technology with enclaves 6.52% [26,28,49]
• Deployment: Containers holding microservices can also be much emphasis are put to conceive solutions applicable at soft-
sources of vulnerabilities. Containers can be compromised infrastructure and API gateways where less attention is being paid
through gaining an unauthorized access or deriving vulner- to composition and hard-infrastructure layers.
abilities from using images from untrusted sources. Thus,
appropriate security measures should also be taken at this 5.3.2. MSA security mechanisms target platforms (RQ4)
The identified papers in this study are classified regarding the
level.
target platforms and applications for their proposed solutions.
• Soft-Infrastructure: Infrastructure vulnerabilities are lower Table 11 shows that 34.78% of papers proposed MSA security
level vulnerabilities that can affect practically every soft- solutions that work for different platforms; closer proportion is
ware entity running on the network including monitors, found for solutions to deal with securing microservices in the
registries, message brokers, load balancers and other orches- cloud platform. Few studies proposed platform specific solutions
trators. Thus, introducing techniques at this level to guaran- such as 5G platform, IoT, Web applications, kubernetes platforms
tee the security of the diverse software network entities and and Springer framework.
the safety of their configuration is of higher importance.
• Hard-Infrastructure: Hardware components are also vulnera- 5.3.3. Microservice security V&V methods (RQ5)
ble to attacks. Attackers may use bugs and backdoors inten- For validating the proposed solutions, we distinguished the
tionally or unintentionally introduced at manufacturing [68] use of several verification and validation approaches:
to initiate attacks. These vulnerabilities need to be tackled • Validation by simulation: this includes: (1) use of simulated
by introducing appropriate error and backdoor detection lab environments or testbeds for testing proposed designs,
mechanisms. (2) simulation of attacks with check bypassing of proposed
security measures.
Table 10 shows the distribution of solutions provided by pri- • Manual testing: this includes: (1) use case-based testing, (2)
mary studies per their application layers. The study revealed that emulate attacks, and (3) reconfigure-testing cycles.
10
A. Hannousse and S. Yahiouche Computer Science Review 41 (2021) 100415
Table 10
MSA security application levels.
Application Layer Percentage Studies
Microservice 20.00% [1,27,39,46–48,60,63,67]
Composition 6.67% [38,41,48]
API 35.56% [12,24,28–31,33,35–37,46,50–53,59]
Communication 22.22% [26,28,30,31,35–37,54,59,65]
Deployment 13.33% [26,40,45,46,49,66]
Soft-Infrastructure 68.89% [1,12,24,25,27–34,36,37,39,42–44,47–49,51,55–60,62,64,67]
Hard-Infrastructure 8.89% [26,40,42,49]
Table 11
MSA security application platforms.
Applications/ Platforms Percentage Studies
IoT applications 13.04% [32,36,43,46,47,58]
Cloud platforms 28.26% [26,30,33,34,37,40,44,45,49,55,57,64,67]
Osmotic computing 2.17% [35]
Container-based platforms 10.87% [39,40,42,56,62]
Web applications 6.52% [44,63,66]
Springer platform 4.35% [50,52]
Kubernetes platform 2.17% [25]
5G platform 2.17% [59]
Independent 34.78% [1,12,24,27–29,31,38,41,48,51,53,54,60,61,65]
Table 12
MSA security verification and validation methods.
V&V methods Percentage Studies
Simulation 6.52% [25,36,47]
Manual Testing 8.70% [42,44,52,66]
Performance analysis 39.13% [1,26,28,29,32,34,36,37,40,42–44,47,49,57,58,64,67]
Qualitative analysis 10.87% [27,30,51,53,64]
Quantitative analysis 8.70% [37,43,56,67]
Adhoc metrics 6.52% [39,42,43]
Case study based validation 26.09% [24,31,33,36,38,46,54,60–63,65]
Proof of concept (POC) 2.17% [50]
Tool-based testing 10.87% [52,55,59,61,67]
Formal verification 2.17% [41]
Complexity measuring 6.52% [1,42,45]
Methodology-based validation 4.35% [39,45]
• Performance analysis: this is performed by measuring over- • Methodology based analysis: use predefined and well-known
heads, latency, throughput, memory storage, CPU usage, methodologies such as OWASP risk rating, attack surface or
response time, and traffic measurement. security risk comparison.
• Qualitative analysis: compare or verify and validate a set
Table 12 shows that performance analysis and case study
of qualitative requirements. These include: causing single
based validation are the most adopted techniques for verification
point to failure, complexity of cracking, complexity of im- and validation. Formal verification, POC and methodology-based
plementation and potential inherent bottleneck. analysis are the least used methods for validation. Validation by
• Quantitative analysis: comparing the proposed solution with simulation and adhoc metrics are found used in equal measure
similar proposals using quantitative metrics such as session with a rate equal to 6.52%. Most simulation methods adopted
sustainability, and popular machine learning metrics. simulated lab environments or testbeds. Only P3 used simulated
• Adhoc metrics: proposing specific metrics for the evaluation attacks to evaluate the proposed technique. Note that most ex-
of proposals. For example, P18 proposed a diversification amined studies used more than one validation techniques and 2
index as a security measure to validate the proposal. Authors studies (P17 and P27) proposed solutions without using any men-
of P21 used a quality of deception metric to evaluate the tioned validation technique. Instead, they discussed the details of
proposed deception mechanism. proposed solutions and claimed that they are sufficient enough
• Case study based validation: use case studies to validate the to mitigate the addressed security threat(s).
feasibility of the proposed solution.
• Proof of concept (POC): develop a prototype to demonstrate 6. An ontology for securing MSA
the feasibility of the proposed solution.
• Tool-based testing: use unit-based testing tools such as Intel- Making the results of our study practical and extendable and
liJ IDEA.3 due to the static nature of taxonomies, we propose an ontology-
• Formal verification: use model checkers or theorem provers based representation of our results similar to the approach pro-
to check the validity of specified properties. posed in [69]. Within an ontology, one can describe relationships
• Complexity measuring: estimate temporal complexity of pro- among ontology concepts and individuals. In our study, rela-
posed algorithms implementing solutions. tionships between security threats and security mechanisms are
mandatory. In addition, mapping security mechanisms to their
applicability architectural levels and platforms is necessary. Fig. 8
3 IntelliJ IDEA: https://www.jetbrains.com/fr-fr/idea/. describes the overall MSA ontology retrieved from this study.
11
A. Hannousse and S. Yahiouche Computer Science Review 41 (2021) 100415
Table 13 7.1. Bias towards external threats, user and data attacks
Relationships between ontology classes.
Object Properties Domain Range Although IBM X-Force [70] reported that 60% of all attacks
applicableAt SecurityMechanism ArchitecturalLayer were carried out by insiders, the study shows that only 13%
applicableTo SecurityMechanism TargetPlatform of primary studies focus on internal attacks. This is probably
hasSource SecurityThreat ThreatSource
due to the fact that external threats are easier to be handled
hasType SecurityMechanism SolutionType
treatedBy SecurityThreat SecurityMechanism compared with internal threats. External threats are common in
treats SecurityMechanism SecurityThreat networking systems and can usually be identified and prevented
validatedThrough SecurityMechanism Security_V&V_Technique by means of strong firewalls and intrusion detection systems;
internal threats often requires considerable policy changes and
Table 14
continuous monitoring of internal traffics. This is owing to privi-
OWL-DL Query samples. leges awarded and sensitive data exposed to insiders. Moreover,
ID Query the diversity of attacks is basically due to the adoption of Zero
Q1 SecurityMechanism and (treats value Unauthorized_Access)
Trust model [71] that suggests to afford no default trust to users,
Q2 SecurityThreat and (treatedBy value Continuous_Monitoring) devices, applications, or packets; instead every action and entity
Q3 SecurityMechanism and (applicableAt value Microservice) need to be authenticated and authorized appropriately. Moreover,
Q4 SecurityThreat and (hasSource value Internal) infrastructure attacks are less addressed due to their complexity
since most attacks require low level solutions especially those
related to hardware, nodes and operating systems. Attacks from
The ontology is developed using Protégé4 and its consistency and other categories often require high level or software-based so-
lutions that can easily be integrated into existing platforms and
coherence are checked using the Protégé Debugger option. The
technologies. This justifies why software, user-based, and data
main concepts of the ontology are:
attacks earned more attention than infrastructure attacks. Thus,
1. SecurityMechanism: describes the set of security mecha- we advocate for research studies that investigate threats caused
by insiders in microservice-based applications. In addition, we
nisms proposed for MSA that have been retrieved by this
suggest to investigate all OWASP identified vulnerabilities with
study.
their effects when adopting microservice architectures.
2. SecurityThreat: describes the set of security threats threat-
ening microservices and microservice architecture that 7.2. Lack of innovative solutions for authorization and mitigation
have been retrieved by this study.
3. ArchitecturalLayer: describes the different architectural lay- The mapping results showed that much emphasis is put on
ers of MSA. authentication and authorization techniques. In fact, this is de-
4. TargetPlatform: describes the set of platforms addressed fensible since authentication and authorization are basic security
by the security mechanisms retrieved by this study. For mechanisms to any secure system. They form a front defense
platform independent solutions, an individual named Inde- line in the protection of the different microservice architecture
pendent is added to this concept class. elements (i.e. individual microservices, API gateway, containers,
5. SolutionType: describes the solution type for each proposed microservice registry, etc.). However, studies considering authen-
mechanism. tication and authorization are less innovative since they propose
6. ThreatSource: describes the source of each threat: internal combination of existing techniques and standards. For example,
or external. the authors of P8 proposed a combination of OAuth 2.0, JWT,
7. Security_V&V_Technique: describes the verification and val- Open ID and SSO used by a special authentication and autho-
idation techniques used for recognized security mecha- rization orchestrator. On the contrary, besides general continuous
monitoring and code analysis, audition proposals are showing
nisms.
the integration of artificial intelligence techniques such as ma-
Relationships between classes are reflected through Protégé chine learning and self-learning algorithms (P10, P22, P35). Those
techniques are based on runtime analysis of user and/or mi-
object properties presented in Table 13.
croservice behaviors and (semi-)automatically take predefined
For the usability of the ontology, OWL-DL queries can be used
actions in reaction to suspicious behaviors. Most, if not all, pro-
to investigate the ontology structure. Table 14 describes some of
posals for mitigation are Moving Target Defense-based solutions
useful queries described in OWL-DL. In Table 14, Q1 can be used (MTD) [72]. The idea behind MTD is to continuously perform
to retrieve the list of security mechanisms applied to deal with transformation of system components and configurations pre-
Unauthorized_access threat. Q2 returns the list of security threats venting attackers from acquiring knowledge about target systems
that can be alleviated by continuous monitoring. Q3 returns the to be used to initiate harmful attacks. This includes periodically
list of security mechanisms applied at individual microservices. update or restart microservices, IP shuffling, and live migration of
Finally, Q4 returns the list of internal threats recognized in this microservices. Specifically, the authors of P21 proposed deception
study. The overall ontology is available at https://github.com/ through live cloning and sandboxing of suspicious containers
hannousse/MSASecurity in an OWL format. respecting the same network overloading and performance to
deceive attackers. Prevention proposals are the most diverse tech-
niques. They vary from using physical computing devices such
7. Discussion as Hardware Security Module (HMS), powerful techniques and
technologies such as encryption and Blockchain into adopting
In this section, we highlight potential research gaps that re- software design decisions such as using secure programming
quire further investigations in the field. Those research gaps are languages and smart contracts. Therefore, more powerful and in-
basically identified through the analysis of the mapping results. novative solutions are required for authentication/authorization.
Moreover, due to the lower rate of mitigation techniques and
their applicability to existing microservice-based systems, we
4 https://protege.stanford.edu/. advocate more research on mitigation.
12
A. Hannousse and S. Yahiouche Computer Science Review 41 (2021) 100415
7.3. Lack of appropriate solutions to secure individual microservices side, performance analysis is very important for checking the
suitability of proposed solutions to particular environments and
Although, microservices are the mainstay of MSA, securing platforms; it is also important for decision makers. Even though
individual microservices is not getting a higher rate. The less performance analysis is applicable to different proposals and
interest in hard-infrastructure solutions is defensible due to their found adopted with the higher rate (39.13%) not all the studies
complexity and cost-intensive compared with soft-infrastructure have adopted it. Note that the diversity and incompatibility of
based solutions. However, individual microservices, their com- validation techniques make the comparison of proposed solutions
position and communication should have much attention than harder. The adoption of performance analysis by all the studies
that has been revealed. Specifically, communication protection is may alleviate this problem.
of a high importance regarding the huge number and nature of
transmitted data in the communication channels. 8. Threats to validity
7.4. Lack of appropriate solutions to emerging technologies In this section we describe construct, internal, external and
conclusion validity threats and how we mitigated their effects on
Cloud-focused and platform independent solutions are found the obtained results.
within higher rates, 34.78% and 28.26%, respectively. The interest
to cloud computing is understandable due to different facilities 8.1. Construct validity
provided to companies by adopting MSA for developing their
applications. Adopting MSA for developing applications in the A construct validity threat to our study concerns the identifi-
cloud allow companies to integrate existing legacy systems, to cation of primary studies from the large set of papers found in the
grow with demands and to use up-to-date and intuitive inter- literature. For this sake, we adopted the guidelines of Kuhrmann
faces. Solutions provided for IoT applications are also getting et al. [16] for the selection of search engines. Search keywords
more attentions due to the specificity and the growing needs to are carefully chosen; they are meant to be as general as possible
those applications in the market. However, more attention should and designed following the guidelines Petticrew and Roberts [17].
be paid to 5G platforms. These are emerging technologies that To avoid bias to search engines, we completed our search by
requires specific attentions. snowballing technique [19] over already identified papers. The
use of several iterations of the snowballing technique allowed
7.5. Absence of appropriate comparison techniques the identification of nine more relevant papers in which five
were not indexed by the selected search engines. For ensuring
The study revealed the adoption of several validation tech- the inclusion of high quality papers, we adopted a set of strict
niques. This is due to the nature of proposed solutions. For ex- inclusion and exclusion criteria where only peer-reviewed journal
ample, formal verification is adopted when formal specification of and conference papers are acceted for their completeness and suf-
systems and their properties are described (e.g.; p20). In the other ficient results. However, since only papers explicitly referring to
13
A. Hannousse and S. Yahiouche Computer Science Review 41 (2021) 100415
microservices or microservice architectures were included, some microservices that can radically lead to a chain defection in MSA.
papers focusing on securing the deployment layer, specifically Moreover, continuous monitoring became very popular among
Docker containers [73] were omitted. MSA designers to prevent possibly future threats. Encryption
remains the most used technique facing sensitive data exposure.
8.2. Internal validity Regarding noticed unbalanced research focus on external attacks
and prevention techniques, we advocate more studies studying
An internal validity threat concerns the data extraction from internal attacks and proposing mitigation techniques. Moreover,
the set of included studies. Both authors are incorporated in more studies are suggested for treating individual microservice
this process. Following the guidelines of Peterson et al. [7], a and communication layers vulnerabilities.
data extraction form is designed by the first author, discussed
and updated after a deep discussion with the second author. Declaration of competing interest
Each author has filled the form independently; after solving the
disagreements between the two authors, a unique and final form The authors declare that they have no known competing finan-
is adopted for the rest of the study. Following the guidelines of cial interests or personal relationships that could have appeared
Kitchenham et al. [6], the kappa coefficient is estimated and found to influence the work reported in this paper.
equal 0.94 which is evaluated as very good or almost perfect score
according to [6].
References
8.3. External validity
[1] T. Yarygina, A.H. Bagge, Overcoming security challenges in microservice
architectures, in: 2018 IEEE Symposium on Service-Oriented System En-
An external validity threat concerns the generalization of the gineering (SOSE), 2018, pp. 11–20, http://dx.doi.org/10.1109/SOSE.2018.
results of the study. The classification schemes adopted in this 00011.
mapping are constructed based on retrieved papers. Future pub- [2] S. Baškarada, V. Nguyen, A. Koronios, Architecting microservices: Practical
opportunities and challenges, J. Comput. Inf. Syst. (2018) 1–9, http://dx.
lished studies may fit to the proposed scheme where many others doi.org/10.1080/08874417.2018.1520056.
may not. For this sake, we developed an ontology incorporat- [3] N. Dragoni, S. Giallorenzo, A.L. Lafuente, M. Mazzara, F. Montesi, R.
ing all the classification schemes. The constructed ontology is Mustafin, L. Safina, Microservices: Yesterday, Today, and Tomorrow,
made freely available for researchers and practitioners for further Springer International Publishing, Cham, 2017, pp. 195–216, (Chapter 12).
updates when new studies are published and not fitting the http://dx.doi.org/10.1007/978-3-319-67425-4_12.
[4] N. Alshuqayran, N. Ali, R. Evans, A systematic mapping study in mi-
proposed schemes.
croservice architecture, in: 2016 IEEE 9th International Conference on
Service-Oriented Computing and Applications (SOCA), IEEE, 2016, pp.
8.4. Conclusion validity 44–51.
[5] J. Bogner, J. Fritzsch, S. Wagner, A. Zimmermann, Microservices in indus-
A conclusion validity threat to our study concerns the adop- try: Insights into technologies, characteristics, and software quality, in:
2019 IEEE International Conference on Software Architecture Companion
tion of taxonomies for security threats and mechanisms. In fact, (ICSA-C), 2019, pp. 187–195, http://dx.doi.org/10.1109/ICSA-C.2019.00041.
several taxonomies are investigated [1,11,22], however, none of [6] B.A. Kitchenham, D. Budgen, P. Brereton, Evidence-Based Software
those taxonomies enables the proper classification of all the iden- Engineering and Systematic Reviews, Chapman & Hall/CRC, 2015.
tified studies. Thus, we used open and selective coding from [7] K. Petersen, R. Feldt, S. Mujtaba, M. Mattsson, Systematic mapping studies
grounded theory [23] and we adopted a classification based on in software engineering, in: Proceedings of the 12th International Con-
ference on Evaluation and Assessment in Software Engineering, EASE’08,
deeper analysis of the focus and the proposed solutions of iden- Swindon, UK, 2008, pp. 68–77.
tified papers. Some of the categories of our classifications are [8] K. Petersen, S. Vakkalanka, L. Kuzniarz, Guidelines for conducting sys-
already used in existing taxonomies, some are either used as they tematic mapping studies in software engineering: An update, Inf. Softw.
are or adapted to fulfill the context of our study. Technol. 64 (2015) 1–18, http://dx.doi.org/10.1016/j.infsof.2015.03.007.
[9] A.P. Vale, G. Márquez, H. Astudillo, E.B. Fernandez, Security mechanisms
used in microservices-based systems: A systematic mapping, in: XLV Latin
9. Conclusion
American Computing Conference, 2019, pp. 1–10.
[10] D. Yu, Y. Jin, Y. Zhang, X. Zheng, A survey on security issues in ser-
In this study, we conducted a systematic mapping on securing vices communication of microservices-enabled fog applications, Concurr.
microservices focusing on threats, nature, applicability platforms, Comput.: Pract. Exper. 31 (22) (2019) e4436, e4436 cpe.4436, http://dx.
and validation techniques of security proposals. The study exam- doi.org/10.1002/cpe.4436. arXiv:https://onlinelibrary.wiley.com/doi/pdf/10.
1002/cpe.4436.
ined 46 papers published since 2011. The results revealed that
[11] L. de Aguiar Monteiro, W.H.C. Almeida, R.R. Hazin, A.C. de Lima, S.K.G.
unauthorized access, sensitive data exposure and compromis- e Silva, F.S. Ferraz, A survey on microservice security–trends in architec-
ing individual microservices are the most treated and addressed ture, privacy and standardization on cloud computing environments, Int.
threats by contemporary studies. The results also revealed that J. Adv. Secur. 11 (3–4) (2018) 201–213.
auditing, enforcing access control, and prevention based solu- [12] P. Nkomo, M. Coetzee, Software development activities for secure mi-
croservices, in: S. Misra, O. Gervasi, B. Murgante, E. Stankova, V. Korkhov,
tions are the most proposed security mechanisms. Additionally, C. Torre, A.M.A. Rocha, D. Taniar, B.O. Apduhan, E. Tarantino (Eds.),
we found that most proposed solutions are applicable at soft- Poceedings of International Conference on Computational Science and its
infrastructure layer of MSA. Our study shows that 34.78% of Applications, ICCSA 2019, Springer International Publishing, Cham, 2019,
papers proposed MSA security solutions that work for different pp. 573–585.
platforms, the same proportion is noticed for cloud-based so- [13] S. Sultan, I. Ahmad, T. Dimitriou, Container security: Issues, challenges, and
the road ahead, IEEE Access 7 (2019) 52976–52996, http://dx.doi.org/10.
lutions. Finally, we found that most verification and validation 1109/ACCESS.2019.2911732.
methods were based on performance analysis, and case studies. [14] M. Bélair, S. Laniepce, J.-M. Menaud, Leveraging kernel security mecha-
We also proposed and made available an ontology summarizing nisms to improve container security: A survey, in: Proceedings of the 14th
and gathering the retrieved results. The proposed ontology can be International Conference on Availability, Reliability and Security, ARES ’19,
ACM, New York, NY, USA, 2019, pp. 76:1–76:6, http://dx.doi.org/10.1145/
used as a guide to developers about recognized threats and secu-
3339252.3340502.
rity mechanisms for MSA. We noticed that most addressed threats [15] M. Felderer, J.C. Carver, Guidelines for systematic mapping studies in secu-
are well-known for other architectural styles and few are con- rity engineering, in: Empirical Research for Software Security: Foundations
cerned directly with MSA. Specifically, compromising individual and Experience, CRC Press, 2018, pp. 47–69.
14
A. Hannousse and S. Yahiouche Computer Science Review 41 (2021) 100415
[16] M. Kuhrmann, D.M. Fernández, M. Daneva, On the pragmatic design of [35] A. Buzachis, M. and Villari, Basic principles of osmotic computing: Secure
literature studies in software engineering: an experience-based guideline, and dependable microelements (mels) orchestration leveraging blockchain
Empir. Softw. Eng. 22 (6) (2017) 2852–2891, http://dx.doi.org/10.1007/ facilities, in: 2018 IEEE/ACM International Conference on Utility and Cloud
s10664-016-9492-y. Computing Companion (UCC Companion), 2018, pp. 47–52, http://dx.doi.
[17] M. Petticrew, H. Roberts, Systematic Reviews in the Social Sciences: A org/10.1109/UCC-Companion.2018.00033.
Practical Guide, John Wiley & Sons, Ltd, 2006. [36] V.M. George, Q.H. Mahmoud, Claimsware: A claims-based middleware for
[18] C. Wohlin, Guidelines for snowballing in systematic literature studies and securing iot services, in: 2017 IEEE 41st Annual Computer Software and
a replication in software engineering, in: Proceedings of the 18th Interna- Applications Conference (COMPSAC), 1, 2017, pp. 649–654, http://dx.doi.
tional Conference on Evaluation and Assessment in Software Engineering, org/10.1109/COMPSAC.2017.85.
EASE ’14, Association for Computing Machinery, New York, NY, USA, 2014, [37] A. Ranjbar, M. Komu, P. Salmela, T. Aura, Synaptic: Secure and persistent
pp. 1–10, http://dx.doi.org/10.1145/2601248.2601268. connectivity for containers, in: 2017 17th IEEE/ACM International Sympo-
[19] C. Wohlin, Second-generation systematic literature studies using snow- sium on Cluster, Cloud and Grid Computing (CCGRID), 2017, pp. 262–267,
balling, in: Proceedings of the 20th International Conference on Evaluation http://dx.doi.org/10.1109/CCGRID.2017.62.
and Assessment in Software Engineering, EASE ’16, Association for Com- [38] M. Ahmadvand, A. Ibrahim, Requirements reconciliation for scalable and
puting Machinery, New York, NY, USA, 2016, pp. 1–6, http://dx.doi.org/10. secure microservice (de)composition, in: 2016 IEEE 24th International
1145/2915970.2916006. Requirements Engineering Conference Workshops (REW), 2016, pp. 68–73,
http://dx.doi.org/10.1109/REW.2016.026.
[20] M.S. Farooq, S. Riaz, A. Abid, T. Umer, Y.B. Zikria, Role of iot technology
[39] K.A. Torkura, M.I.H. Sukmana, A.V.D.M. Kayem, A cyber risk based
in agriculture: A systematic literature review, Electronics 9 (2). http:
moving target defense mechanism for microservice architectures, in:
//dx.doi.org/10.3390/electronics9020319.
2018 IEEE Intl Conf on Parallel Distributed Processing with Applica-
[21] A. Fernandez, E. Insfran, S. Abrahão, Usability evaluation methods for
tions, Ubiquitous Computing Communications, Big Data Cloud Computing,
the web: A systematic mapping study, Inf. Softw. Technol. 53 (8) (2011)
Social Computing Networking, Sustainable Computing Communications
789–817, http://dx.doi.org/10.1016/j.infsof.2011.02.007.
(ISPA/IUCC/BDCloud/SocialCom/SustainCom), 2018, pp. 932–939, http://dx.
[22] OWASP, Owasp Top 10: The Ten Most Critical Web Application Security doi.org/10.1109/BDCloud.2018.00137.
Risks, Tech. Rep., OWASP Foundation, 2017. [40] H. Jin, Z. Li, D. Zou, B. Yuan, Dseom: A framework for dynamic security
[23] A.L. Strauss, J.M. Corbin, Basics of Qualitative Research: Techniques and evaluation and optimization of mtd in container-based cloud, IEEE Trans.
Procedures for Developing Grounded Theory, Sage Publications, Thousand Dependable Secure Comput. (2019) 1–12, http://dx.doi.org/10.1109/TDSC.
Oaks, Calif, 1998. 2019.2916666.
[24] M. Ahmadvand, A. Pretschner, K. Ball, D. Eyring, Integrity protection [41] C. Gerking, D. Schubert, Component-based refinement and verification of
against insiders in microservice-based infrastructures: From threats to a information-flow security policies for cyber–physical microservice archi-
security framework, in: M. Mazzara, I. Ober, G. Salaün (Eds.), Proceedings tectures, in: 2019 IEEE International Conference on Software Architecture
of Federation of International Conferences on Software Technologies: (ICSA), 2019, pp. 61–70, http://dx.doi.org/10.1109/ICSA.2019.00015.
Applications and Foundations, Springer International Publishing, Cham, [42] A. Osman, P. Bruckner, H. Salah, F.H.P. Fitzek, T. Strufe, M. Fischer,
2018, pp. 573–588. Sandnet: Towards high quality of deception in container-based microser-
[25] N. Surantha, F. Ivan, Secure kubernetes networking design based on zero vice architectures, in: ICC 2019-2019 IEEE International Conference on
trust model: A case study of financial service enterprise in indonesia, Communications (ICC), 2019, pp. 1–7, http://dx.doi.org/10.1109/ICC.2019.
in: L. Barolli, F. Xhafa, O.K. Hussain (Eds.), Proceedings of International 8761171.
Conference on Innovative Mobile and Internet Services in Ubiquitous [43] M. Pahl, F. Aubet, All eyes on you: Distributed multi-dimensional iot
Computing, Springer International Publishing, Cham, 2020, pp. 348–361. microservice anomaly detection, in: 2018 14th International Conference
[26] S. Brenner, T. Hundt, G. Mazzeo, R. Kapitza, Secure cloud micro services on Network and Service Management (CNSM), 2018, pp. 72–80.
using intel sgx, in: L.Y. Chen, H.P. Reiser (Eds.), Proceedings of IFIP [44] R. Ravichandiran, H. Bannazadeh, A. Leon-Garcia, Anomaly detection using
International Conference on Distributed Applications and Interoperable resource behaviour analysis for autoscaling systems, in: 2018 4th IEEE
Systems, Springer International Publishing, Cham, 2017, pp. 177–191. Conference on Network Softwarization and Workshops (NetSoft), 2018, pp.
[27] C. Otterstad, T. Yarygina, Low-level exploitation mitigation by diverse 192–196, http://dx.doi.org/10.1109/NETSOFT.2018.8460025.
microservices, in: F. De Paoli, S. Schulte, E. Broch Johnsen (Eds.), Proceed- [45] Z. Wen, T. Lin, R. Yang, S. Ji, R. Ranjan, A. Romanovsky, C. Lin, J. Xu, Ga-
ings of the 6th IFIP WG 2.14 European Conference on Service-Oriented par: Dependable microservice orchestration framework for geo-distributed
and Cloud Computing, Springer International Publishing, Cham, 2017, pp. clouds, IEEE Trans. Parallel Distrib. Syst. (2019) 1–16, http://dx.doi.org/10.
49–56, http://dx.doi.org/10.1007/978-3-319-67262-5_4. 1109/TPDS.2019.2929389.
[46] D. Lu, D. Huang, A. Walenstein, D. Medhi, A secure microservice framework
[28] T. Yarygina, C. Otterstad, A game of microservices: Automated intrusion
for iot, in: 2017 IEEE Symposium on Service-Oriented System Engineering
response, in: S. Bonomi, E. Rivière (Eds.), Proceedings of IFIP Interna-
(SOSE), 2017, pp. 9–18, http://dx.doi.org/10.1109/SOSE.2017.27.
tional Conference on Distributed Applications and Interoperable Systems,
Springer International Publishing, Cham, 2018, pp. 169–177, http://dx.doi. [47] M. Pahl, L. Donini, Securing iot microservices with certificates, in: NOMS
org/10.1007/978-3-319-93767-0_12. 2018-2018 IEEE/IFIP Network Operations and Management Symposium,
2018, pp. 1–5, http://dx.doi.org/10.1109/NOMS.2018.8406189.
[29] A. Nehme, V. Jesus, K. Mahbub, A. Abdallah, Fine-grained access control for
[48] A. Nehme, V. Jesus, K. Mahbub, A. Abdallah, Securing microservices, IT Prof.
microservices, in: N. Zincir-Heywood, G. Bonfante, M. Debbabi, J. Garcia-
21 (1) (2019) 42–49, http://dx.doi.org/10.1109/MITP.2018.2876987.
Alfaro (Eds.), Proceedings of the International Symposium on Foundations
[49] C. Fetzer, Building critical applications using microservices, IEEE Secur.
and Practice of Security, Springer International Publishing, Cham, 2019, pp.
Privacy 14 (6) (2016) 86–89, http://dx.doi.org/10.1109/MSP.2016.129.
285–300, http://dx.doi.org/10.1007/978-3-030-18419-3_19.
[50] Q. Nguyen, O.F. Baker, Applying spring security framework and oauth2 to
[30] A. Bánáti, E. Kail, K. Karóczkai, M. Kozlovszky, Authentication and au-
protect microservice architecture API, JSW 14 (6) (2019) 257–264.
thorization orchestrator for microservice-based software architectures,
[51] X. He, X. Yang, Authentication and authorization of end user in microser-
in: 2018 41st International Convention on Information and Communi-
vice architecture, J. Phys. Conf. Ser. 910 (2017) 012060, http://dx.doi.org/
cation Technology, Electronics and Microelectronics (MIPRO), 2018, pp.
10.1088/1742-6596/910/1/012060.
1180–1184, http://dx.doi.org/10.23919/MIPRO.2018.8400214.
[52] O. Baker, Q. Nguyen, A novel approach to secure microservice architecture
[31] D. Nagothu, R. Xu, S.Y. Nikouei, Y. Chen, A microservice-enabled archi- from owasp vulnerabilities, in: Proceedings of the 10th Annual CITRENZ
tecture for smart surveillance using blockchain technology, in: 2018 IEEE Conference (2019), ITx New Zealand’s Conference of IT, Nelson, NZ, 2019,
International Smart Cities Conference (ISC2), 2018, pp. 1–4, http://dx.doi. pp. 54–58.
org/10.1109/ISC2.2018.8656968. [53] J. Salibindla, Microservices api security, Int. J. Eng. Res. Technol. 7 (1)
[32] M. Pahl, F. Aubet, S. Liebald, Graph-based iot microservice security, (2018) 277–281.
in: NOMS 2018-2018 IEEE/IFIP Network Operations and Management [54] K. Jander, L. Braubach, A. Pokahr, Practical defense-in-depth solution for
Symposium, 2018, pp. 1–3, http://dx.doi.org/10.1109/NOMS.2018.8406118. microservice systems, J. Ubiquit. Syst. Pervasive Netw. 11 (1) (2019) 17–25,
[33] Tran Quang Thanh, S. Covaci, T. Magedanz, P. Gouvas, A. Zafeiropoulos, http://dx.doi.org/10.5383/juspn.11.01.003.
Embedding security and privacy into the development and operation of [55] K.A. Torkura, M.I. Sukmana, F. Cheng, C. Meinel, Cavas: Neutralizing
cloud applications and services, in: 2016 17th International Telecommuni- application and container security vulnerabilities in the cloud native era,
cations Network Strategy and Planning Symposium (Networks), 2016, pp. in: International Conference on Security and Privacy in Communication
31–36, http://dx.doi.org/10.1109/NETWKS.2016.7751149. Systems, Springer, 2018, pp. 471–490.
[34] Y. Sun, S. Nanda, T. Jaeger, Security-as-a-service for microservices-based [56] J. Chen, H. Huang, H. Chen, Informer: Irregular traffic detection for
cloud applications, in: 2015 IEEE 7th International Conference on Cloud containerized microservices rpc in the real world, in: Proceedings of the
Computing Technology and Science (CloudCom), 2015, pp. 50–57, http: 4th ACM/IEEE Symposium on Edge Computing, SEC ’19, ACM, New York,
//dx.doi.org/10.1109/CloudCom.2015.93. NY, USA, 2019, pp. 389–394, http://dx.doi.org/10.1145/3318216.3363375.
15
A. Hannousse and S. Yahiouche Computer Science Review 41 (2021) 100415
[57] K.A. Torkura, M.I. Sukmana, C. Meinel, Integrating continuous security [64] M. Krämer, S. Frese, A. Kuijper, Implementing secure applications in smart
assessments in microservices and cloud native applications, in: Proceedings city clouds using microservices, Future Gener. Comput. Syst. 99 (2019)
of The10th International Conference on Utility and Cloud Computing, UCC 308–320, http://dx.doi.org/10.1016/j.future.2019.04.042.
’17, ACM, New York, NY, USA, 2017, pp. 171–180, http://dx.doi.org/10. [65] K. Jander, L. Braubach, A. Pokahr, Defense-in-depth and role authentication
1145/3147213.3147229. for microservice systems, Procedia Comput. Sci. 130 (2018) 456–463,
[58] S. Akkermans, B. Crispo, W. Joosen, D. Hughes, Polyglot cerberos: Re- the 9th International Conference on Ambient Systems, Networks and
source security, interoperability and multi-tenancy for iot services on Technologies (ANT 2018) / The 8th International Conference on Sustainable
a multilingual platform, in: Proceedings of the 15th EAI International Energy Information Technology (SEIT-2018) / Affiliated Workshops. http:
Conference on Mobile and Ubiquitous Systems: Computing, Networking //dx.doi.org/10.1016/j.procs.2018.04.047.
and Services, MobiQuitous ’18, ACM, New York, NY, USA, 2018, pp. 59–68, [66] S. Abidi, M. Essafi, C.G. Guegan, M. Fakhri, H. Witti, H.H.B. Ghezala, A
http://dx.doi.org/10.1145/3286978.3286997. web service security governance approach based on dedicated micro-
[59] D. Guija, M.S. Siddiqui, Identity and access control for micro-services based services, in: Knowledge-Based and Intelligent Information & Engineering
5g nfv platforms, in: Proceedings of the 13th International Conference on Systems: Proceedings of the 23rd International Conference KES2019, Pro-
Availability, Reliability and Security, ARES 2018, ACM, New York, NY, USA, cedia Comput. Sci. 159 (2019) 372–386, http://dx.doi.org/10.1016/j.procs.
2018, pp. 46:1–46:10, http://dx.doi.org/10.1145/3230833.3233255. 2019.09.192.
[60] X. Li, Y. Chen, Z. Lin, Towards automated inter-service authorization for [67] M. Elsayed, M. Zulkernine, Offering security diagnosis as a service for cloud
microservice applications, in: Proceedings of the ACM SIGCOMM 2019 saas applications, J. Inf. Secur. Appl. 44 (2019) 32–48, http://dx.doi.org/10.
Conference Posters and Demos, SIGCOMM Posters and Demos ’19, ACM, 1016/j.jisa.2018.11.006.
New York, NY, USA, 2019, pp. 3–5, http://dx.doi.org/10.1145/3342280. [68] V. Mavroudis, A. Cerulli, P. Svenda, D. Cvrcek, D. Klinec, G. Danezis,
3342288. A touch of evil: High-assurance cryptographic hardware from untrusted
[61] G. Márquez, H. Astudillo, Identifying availability tactics to support security components, in: Proceedings of the 2017 ACM SIGSAC Conference on Com-
architectural design of microservice-based systems, in: Proceedings of the puter and Communications Security, CCS ’17, Association for Computing
13th European Conference on Software Architecture - Volume 2, ECSA ’19, Machinery, New York, NY, USA, 2017, pp. 1583–1600, http://dx.doi.org/10.
ACM, New York, NY, USA, 2019, pp. 123–129, http://dx.doi.org/10.1145/ 1145/3133956.3133961.
3344948.3344996. [69] A.P. Vale, E.B. Fernandez, An ontology for security patterns, in: 2019 38th
[62] A. Ibrahim, S. Bozhinoski, A. Pretschner, Attack graph generation for International Conference of the Chilean Computer Science Society (SCCC),
microservice architecture, in: Proceedings of the 34th ACM/SIGAPP Sym- 2019, pp. 1–8, http://dx.doi.org/10.1109/SCCC49216.2019.8966393.
posium on Applied Computing, SAC ’19, ACM, New York, NY, USA, 2019, [70] IBM, An integrated approach to insider threat protection, 2016, URL https:
pp. 1235–1242, http://dx.doi.org/10.1145/3297280.3297401. //www.ibm.com/security/services/insider-threat-protection.
[63] D.M. Stallenberg, A. Panichella, Jcomix: A search-based tool to detect xml [71] J. Kindervag, S. Balaouras, K. Mak, Build Security Into Your Network’s Dna:
injection vulnerabilities in web applications, in: Proceedings of the 2019 The Zero Trust Network Architecture, Tech. rep. Forrester Research, 2012.
27th ACM Joint Meeting on European Software Engineering Conference and [72] R. Zhuang, S.A. DeLoach, X. Ou, Towards a theory of moving target defense,
Symposium on the Foundations of Software Engineering, ESEC/FSE 2019, in: Proceedings of the First ACM Workshop on Moving Target Defense,
ACM, New York, NY, USA, 2019, pp. 1090–1094, http://dx.doi.org/10.1145/ MTD ’14, Association for Computing Machinery, New York, NY, USA, 2014,
3338906.3341178. pp. 31–40, http://dx.doi.org/10.1145/2663474.2663479.
[73] D. Merkel, Docker: lightweight linux containers for consistent development
and deployment, Linux J. 2014 (239) (2014) 2.
16