Microservices Security: Bad vs. Good Practices

被引:0
作者
Ponce, Francisco [1 ,2 ]
Soldani, Jacopo [3 ]
Astudillo, Hernan [1 ]
Brogi, Antonio [3 ]
机构
[1] Univ Tecn Federico Santa Maria, Valparaiso, Chile
[2] Univ Andres Bello, Fac Ingn, Inst Tecnol Innovac Salud & Bienestar, Valparaiso, Chile
[3] Univ Pisa, Pisa, Italy
来源
SOFTWARE ARCHITECTURE. ECSA 2022 TRACKS AND WORKSHOPS | 2023年 / 13928卷
关键词
microservices; security; bad practices; good practices; GREY LITERATURE; SOFTWARE;
D O I
10.1007/978-3-031-36889-9_23
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The microservice architectural style is widespread in enterprise IT, making the securing of microservices a crucial issue. Many bad practices in securing microservices have been identified by researchers and practitioners, along with security good practices that, if adopted, allow to avoid the corresponding security issues. However, this knowledge is scattered across multiple pieces of white and grey literature, making its consulting complex and time consuming. We present here the results of a multivocal literature review that analyzes 44 primary studies discussing bad and good practices for microservice security. We were able to identify four bad and six good practices, and to associate each bad practice with specific bad smell(s) that signal it and with good practice(s) that avoid incurring in it. The resulting mapping between bad and good practices for microservice security can help practitioners and researchers to explore the systematic securing of microservice-based applications.
引用
收藏
页码:337 / 352
页数:16
相关论文
共 62 条
  • [1] Abasi F., 2019, IBM Developer
  • [2] [Anonymous], 2019, Wallarm: moving to microservices with security in mind
  • [3] [Anonymous], 2020, Radware: microservice architectures challenge traditional security practices
  • [4] [Anonymous], 2019, SumoLogic: improving security in your microservices architecture
  • [5] Manual or electronic? The role of coding in qualitative data analysis
    Basit, TN
    [J]. EDUCATIONAL RESEARCH, 2003, 45 (02) : 143 - 154
  • [6] Behrens S., 2017, The Netflix Tech Blog
  • [7] Microservice security: a systematic literature review
    Berardi, Davide
    Giallorenzo, Saverio
    Mauro, Jacopo
    Melis, Andrea
    Montesi, Fabrizio
    Prandini, Marco
    [J]. PEERJ COMPUTER SCIENCE, 2022, 8
  • [8] Boersma E., 2019, Sqreen
  • [9] Budko R., 2018, The New Stack
  • [10] Carrasco A, 2018, PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON REFACTORING, IWOR 2018, P1, DOI 10.1145/3242163.3242164