论文标题
确保微服务和微服务体系结构:系统的映射研究
Securing Microservices and Microservice Architectures: A Systematic Mapping Study
论文作者
论文摘要
微服务体系结构(MSA)正成为现有软件开发范式的趋势替代方案,特别是用于开发复杂和分布式应用程序。微服务作为建筑设计模式出现,旨在解决可扩展性并简化在线服务的维护。但是,安全漏洞增加了基于微服务的系统的威胁性可用性,完整性和机密性。发现越来越多的文献解决了针对单个微服务和微服务体系结构的安全威胁和安全机制。这项研究的目的是向开发人员提供有关已经公认的有关微服务威胁以及如何被发现,缓解或预防的有用指南;我们还旨在确定有关确保MSA的潜在研究差距。在本文中,我们进行了系统的映射,以便将MSA的威胁与其安全建议分类。因此,我们提取了某些研究中报告的拟议解决方案的威胁和细节。获得的结果用于设计用于MSA安全模式的轻量级本体。可以查询本体,以确定威胁的来源,用于防止每个机制使用的每个威胁,适用性层和验证技术的安全机制。系统的搜索产生了1067项研究,其中46项被选为基本研究。映射的结果表明,研究重点是支持外部攻击。与预防和缓解相比,审计和执行访问控制是最受调查的技术。此外,我们发现,与其他层(例如通信和部署)相比,大多数提出的解决方案是适用的软基础结构。我们还发现,绩效分析和案例研究是安全建议最常用的验证技术。
Microservice architectures (MSA) are becoming trending alternatives to existing software development paradigms notably for developing complex and distributed applications. Microservices emerged as an architectural design pattern aiming to address the scalability and ease the maintenance of online services. However, security breaches have increased threatening availability, integrity and confidentiality of microservice-based systems. A growing body of literature is found addressing security threats and security mechanisms to individual microservices and microservice architectures. The aim of this study is to provide a helpful guide to developers about already recognized threats on microservices and how they can be detected, mitigated or prevented; we also aim to identify potential research gaps on securing MSA. In this paper, we conduct a systematic mapping in order to categorize threats on MSA with their security proposals. Therefore, we extracted threats and details of proposed solutions reported in selected studies. Obtained results are used to design a lightweight ontology for security patterns of MSA. The ontology can be queried to identify source of threats, security mechanisms used to prevent each threat, applicability layer and validation techniques used for each mechanism. The systematic search yielded 1067 studies of which 46 are selected as primary studies. The results of the mapping revealed an unbalanced research focus in favor of external attacks; auditing and enforcing access control are the most investigated techniques compared with prevention and mitigation. Additionally, we found that most proposed solutions are soft-infrastructure applicable layer compared with other layers such as communication and deployment. We also found that performance analysis and case studies are the most used validation techniques of security proposals.