Towards Security-Aware Microservices: On Extracting Endpoint Data Access Operations to Determine Access Rights

被引:2
作者
Abdelfattah, Amr S. [1 ]
Schiewe, Micah [1 ]
Curtis, Jacob [1 ]
Cerny, Tomas [1 ]
Song, Eunjee [1 ]
机构
[1] Baylor Univ, Comp Sci, ECS, One Bear Pl 97141, Waco, TX 76798 USA
来源
PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2023 | 2023年
基金
美国国家科学基金会;
关键词
Static Analysis; Microservices; Access Rights; CHALLENGES;
D O I
10.5220/0011707500003488
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security policies are typically defined centrally for a particular system. However, the current mainstream architecture - microservices - introduces decentralization with self-contained interacting parts. This brings better evolution autonomy to individual microservices but introduces new challenges with consistency. The most basic security perspective is the setting of access rights; we typically enforce access rights at system endpoints. Given the self-contained and decentralized microservice nature, each microservice has to implement these policies individually. Considering that different development teams are involved in microservice development, likely the access rights are not consistently implemented across the system. Moreover, as the system evolves, it can quickly become cumbersome to identify a holistic view of the full set of access rights applied in the system. Various issues can emerge from inconsistent settings and potentially lead to security vulnerabilities and unintended bugs, such as incorrectly granting write or read access to system data. This paper presents an approach aiding a human-centered access right analysis of system endpoints in microservices. It identifies the system data that a particular endpoint accesses throughout its call paths and determines which operations are performed on these data across the call paths. In addition, it takes into account inter-service communication across microservices, which brings a great and novel instrument to practitioners who would otherwise need to perform a thorough code review of self-contained codebases to extract such information from the system. The presented approach has broad potential related to security analysis, further detailed in the paper.
引用
收藏
页码:15 / 23
页数:9
相关论文
共 11 条
[1]  
[Anonymous], 2000, Experimentation in Software Engineering-An Introduction
[2]   Industry practices and challenges for the evolvability assurance of microservices An interview study and systematic grey literature review [J].
Bogner, Justus ;
Fritzsch, Jonas ;
Wagner, Stefan ;
Zimmermann, Alfred .
EMPIRICAL SOFTWARE ENGINEERING, 2021, 26 (05)
[3]   On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices [J].
Cerny, Tomas ;
Svacina, Jan ;
Das, Dipta ;
Bushong, Vincent ;
Bures, Miroslav ;
Tisnovsky, Pavel ;
Frajtak, Karel ;
Shin, Dongwan ;
Huang, Jun .
IEEE ACCESS, 2020, 8 :159449-159470
[4]   On automated RBAC assessment by constructing a centralized perspective for microservice mesh [J].
Das, Dipta ;
Walker, Andrew ;
Bushong, Vincent ;
Svacina, Jan ;
Cerny, Tomas ;
Matyas, Vashek .
PEERJ COMPUTER SCIENCE, 2021, 7 :1-24
[5]  
Le H T., 2015, Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, P27
[6]   Advancing Static Code Analysis With Language-Agnostic Component Identification [J].
Schiewe, Micah ;
Curtis, Jacob ;
Bushong, Vincent ;
Cerny, Tomas .
IEEE ACCESS, 2022, 10 :30743-30761
[7]  
Son S, 2011, OOPSLA 11: PROCEEDINGS OF THE 2011 ACM INTERNATIONAL CONFERENCE ON OBJECT ORIENTED PROGRAMMING SYSTEMS LANGUAGES AND APPLICATIONS, P1069
[8]  
Son Sooel, 2013, NDSS
[9]  
Srivastava V, 2011, PLDI 11: PROCEEDINGS OF THE 2011 ACM CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION, P343
[10]   Towards Continuous Access Control Validation and Forensics [J].
Xiang, Chengcheng ;
Wu, Yudong ;
Shen, Bingyu ;
Shen, Mingyao ;
Huang, Haochen ;
Xu, Tianyin ;
Zhou, Yuanyuan ;
Moore, Cindy ;
Jin, Xinxin ;
Sheng, Tianwei .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :113-129