Proceedings of The10th International Conference on Utility and Cloud Computing 2017
DOI: 10.1145/3147213.3147229
|View full text |Cite
|
Sign up to set email alerts
|

Integrating Continuous Security Assessments in Microservices and Cloud Native Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(15 citation statements)
references
References 12 publications
0
15
0
Order By: Relevance
“…They observe that, though these are the best suited from the existing solutions, none of these solutions can provide the required level of security for microservices architectures, thus calling for more researchers to devise stringent policies to conform to the desired security level. - Security among microservices : There are few approaches that consider mechanisms on how microservices can trust each other. Torkura et al proposed a security gateway, coupled with a dynamic document store, which maintains OpenAPI documentation of each microservice and a security health endpoint, which can be subjected to frequent heartbeat checks. These help embed continuous security assessments in the microservices‐based systems.…”
Section: Taxonomy Based On Different Aspects Of Msasmentioning
confidence: 99%
“…They observe that, though these are the best suited from the existing solutions, none of these solutions can provide the required level of security for microservices architectures, thus calling for more researchers to devise stringent policies to conform to the desired security level. - Security among microservices : There are few approaches that consider mechanisms on how microservices can trust each other. Torkura et al proposed a security gateway, coupled with a dynamic document store, which maintains OpenAPI documentation of each microservice and a security health endpoint, which can be subjected to frequent heartbeat checks. These help embed continuous security assessments in the microservices‐based systems.…”
Section: Taxonomy Based On Different Aspects Of Msasmentioning
confidence: 99%
“…However, excepting for the advantages brought to container-based cloud environment, some security issues introduced by these new technologies are also being widely concerned. The main security issues include the weak isolation problem among containers [19] which also exists in VM-based cloud environment [20], greater attack surface caused by microservice [21], [22], and the security drift problem caused by its high dynamic [23].…”
Section: Container-based Cloud Environmentmentioning
confidence: 99%
“…6 shows the effectiveness of MTD strategies after these update events happened on Apache (No.1-4), Tomcat (No. [5][6][7][8], ImageMagick (No.9-12) and Memcached (No. [13][14][15][16].…”
Section: Usability Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…The traditional Monolithic approach of software architecture requires the entire application stack to be bundled together for each deployment. This concept creates many drawbacks for the application, especially the inflexible scalability, the high cost of resources and refactoring effort, difficulties of the DevOps between distributed teams [1]. Microservice Architecture (MSA) is supposed to address these problems by decomposing the application into separated services; each service takes responsibility for a single business capability and is deployed and executed independently.…”
Section: Introductionmentioning
confidence: 99%