Security Gap in Microservices: A Systematic Literature Review

被引:0
|
作者
Hutasuhut, Nurman Rasyid Panusunan [1 ]
Amri, Mochamad Gani [1 ]
Aji, Rizal Fathoni [1 ]
机构
[1] Univ Indonesia, Fac Comp Sci, Jakarta, Indonesia
关键词
-Microservice security; cyber-attacks; container; security standards; access control;
D O I
10.14569/IJACSA.2024.0151218
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The growing importance of microservices architecture has raised concerns about its security despite a rise in publications addressing various aspects of microservices. Security issues are particularly critical in microservices due to their complex and distributed nature, which makes them vulnerable to various types of cyber-attacks. This study aims to fill the gap in systematic investigations into microservice security by reviewing current state-of-the-art solutions and models. A total of 487 papers were analyzed, with the final selection refined to 87 relevant articles using a snowball method. This approach ensures that the focus remains on security issues, particularly those identified post- 2020. However, there is still a significant lack of dedicated security standards or comprehensive models specifically designed for microservices. Key findings highlight the vulnerabilities of container-based applications, the evolving nature of cyber-attacks, and the critical need for effective access control. Moreover, a substantial knowledge gap exists between academia and industry practitioners, which compounds the challenges of securing microservices. This study emphasizes the need for more focused research on security models and guidelines to address the unique vulnerabilities of microservices and facilitate their secure integration into critical applications across various domains.
引用
收藏
页码:165 / 171
页数:7
相关论文
共 50 条
  • [21] A Systematic Literature Review of Information Security in Chatbots
    Yang, Jing
    Chen, Yen-Lin
    Por, Lip Yee
    Ku, Chin Soon
    APPLIED SCIENCES-BASEL, 2023, 13 (11):
  • [22] Food security governance: a systematic literature review
    Jeroen J. L. Candel
    Food Security, 2014, 6 : 585 - 601
  • [23] BYOD security issues: a systematic literature review
    Ratchford, Melva
    El-Gayar, Omar
    Noteboom, Cherie
    Wang, Yong
    INFORMATION SECURITY JOURNAL, 2022, 31 (03): : 253 - 273
  • [24] INFORMATION SECURITY CULTURE: A SYSTEMATIC LITERATURE REVIEW
    Hassan, Noor Hafizah
    Ismail, Zuraini
    Maarop, Nurazean
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS, 2015, : 456 - 463
  • [25] A systematic literature review of blockchain cyber security
    Taylor, Paul J.
    Dargahi, Tooska
    Dehghantanha, Ali
    Parizi, Reza M.
    Choo, Kim-Kwang Raymond
    DIGITAL COMMUNICATIONS AND NETWORKS, 2020, 6 (02) : 147 - 156
  • [26] A systematic literature review of blockchain cyber security
    Paul JTaylor
    Tooska Dargahi
    Ali Dehghantanha
    Reza MParizi
    KimKwang Raymond Choo
    Digital Communications and Networks, 2020, 6 (02) : 147 - 156
  • [27] Security in Smart Toys: A Systematic Review of Literature
    Pontes, Lara
    Coutinho, Gustavo
    Hung, Patrick C. K.
    Yankson, Benjamin
    DISTRIBUTED, AMBIENT AND PERVASIVE INTERACTIONS, 2019, 11587 : 28 - 38
  • [28] Security Issues in Fog Environment: A Systematic Literature Review
    Jasleen Kaur
    Alka Agrawal
    Raees Ahmad Khan
    International Journal of Wireless Information Networks, 2020, 27 : 467 - 483
  • [29] Security and Privacy for Big Data: A Systematic Literature Review
    Nelson, Boel
    Olovsson, Tomas
    2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2016, : 3693 - 3702
  • [30] Security Analysis of the Internet of Things: A Systematic Literature Review
    Martinez, Juan
    Mejia, Jezreel
    Munoz, Mirna
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON SOFTWARE PROCESS IMPROVEMENT (CIMPS 2016): APPLICATIONS IN SOFTWARE ENGINEERING, 2016,