TUHH Open Research
Help
  • Log In
    New user? Click here to register.Have you forgotten your password?
  • English
  • Deutsch
  • Communities & Collections
  • Publications
  • Research Data
  • People
  • Institutions
  • Projects
  • Statistics
  1. Home
  2. TUHH
  3. Publication References
  4. SoK: Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices
 
Options

SoK: Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices

Publikationstyp
Conference Paper
Date Issued
2022-08
Sprache
English
Author(s)
Billawa, Priyanka  
Bambhore Tukaram, Anusha  
Díaz Ferreyra, Nicolás  orcid-logo
Steghöfer, Jan-Philipp  
Scandariato, Riccardo  
Simhandl, Georg  
Institut
Software Security E-22  
TORE-URI
http://hdl.handle.net/11420/13578
Article Number
9
Citation
17th International Conference on Availability, Reliability and Security (ARES 2022)
Contribution to Conference
17th International Conference on Availability, Reliability and Security, ARES 2022  
Publisher DOI
10.1145/3538969.3538986
Scopus ID
2-s2.0-85136927434
Cloud-based application deployment is becoming increasingly popular among businesses, thanks to the emergence of microservices. However, securing such architectures is a challenging task since traditional security concepts cannot be directly applied to microservice architectures due to their distributed nature. The situation is exacerbated by the scattered nature of guidelines and best practices advocated by practitioners and organizations in this field. In this research paper we aim to shay light over the current microservice security discussions hidden within Grey Literature (GL) sources. Particularly, we identify the challenges that arise when securing microservice architectures, as well as solutions recommended by practitioners to address these issues. For this, we conducted a systematic GL study on the challenges and best practices of microservice security present in the Internet with the goal of capturing relevant discussions in blogs, white papers, and standards. We collected 312 GL sources from which 57 were rigorously classified and analyzed. This analysis on the one hand validated past academic literature studies in the area of microservice security, but it also identified improvements to existing methodologies pointing towards future research directions.
Subjects
best practices
challenges
grey literature
microservices
security
TUHH
Weiterführende Links
  • Contact
  • Send Feedback
  • Cookie settings
  • Privacy policy
  • Impress
DSpace Software

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science
Design by effective webwork GmbH

  • Deutsche NationalbibliothekDeutsche Nationalbibliothek
  • ORCiD Member OrganizationORCiD Member Organization
  • DataCiteDataCite
  • Re3DataRe3Data
  • OpenDOAROpenDOAR
  • OpenAireOpenAire
  • BASE Bielefeld Academic Search EngineBASE Bielefeld Academic Search Engine
Feedback