An empirical study of security practices for microservices systems

被引:3
|
作者
Nasab, Ali Rezaei [1 ]
Shahin, Mojtaba [2 ]
Raviz, Seyed Ali Hoseyni [1 ]
Liang, Peng [1 ]
Mashmool, Amir [3 ]
Lenarduzzi, Valentina [4 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Peoples R China
[2] RMIT Univ, Sch Comp Technol, Melbourne 3000, Australia
[3] Univ Genoa, Dept Comp Sci Bioengn Robot & Syst Engn, I-16126 Genoa, Italy
[4] Univ Oulu, Fac Informat Technol & Elect Engn, Oulu 90014, Finland
关键词
Microservice; Security; Empirical study; Practitioners; Practice;
D O I
10.1016/j.jss.2022.111563
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Despite the numerous benefits of microservices systems, security has been a critical issue in such systems. Several factors explain this difficulty, including a knowledge gap among microservices practitioners on properly securing a microservices system. To (partially) bridge this gap, we conducted an empirical study. We first manually analyzed 861 microservices security points, including 567 issues, 9 documents, and 3 wiki pages from 10 GitHub open-source microservices systems and 306 Stack Overflow posts concerning security in microservices systems. In this study, a microservices security point is referred to as "a GitHub issue, a Stack Overflow post, a document, or a wiki page that entails 5 or more microservices security paragraphs". Our analysis led to a catalog of 28 microservices security practices. We then ran a survey with 74 microservices practitioners to evaluate the usefulness of these 28 practices. Our findings demonstrate that the survey respondents affirmed the usefulness of the 28 practices. We believe that the catalog of microservices security practices can serve as a valuable resource for microservices practitioners to more effectively address security issues in microservices systems. It can also inform the research community of the required or less explored areas to develop microservices-specific security practices and tools.(c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] Unveiling security weaknesses in autonomous driving systems: An in-depth empirical study
    Cheng, Wenyuan
    Li, Zengyang
    Liang, Peng
    Mo, Ran
    Liu, Hui
    INFORMATION AND SOFTWARE TECHNOLOGY, 2025, 182
  • [22] Security of Medical Cyber-physical Systems: An Empirical Study on Imaging Devices
    Wang, Zhiqiang
    Ma, Pingchuan
    Zou, Xiaoxiang
    Zhang, Jianyi
    Yang, Tao
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 997 - 1002
  • [23] An empirical study of customers' perceptions of security and trust in e-payment systems
    Kim, Changsu
    Tao, Wang
    Shin, Namchul
    Kim, Ki-Soo
    ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2010, 9 (01) : 84 - 95
  • [24] Goals and Practices in Maintaining Information Systems Security
    Erlich, Zippy
    Zviran, Moshe
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (03) : 40 - 50
  • [25] Security Gap in Microservices: A Systematic Literature Review
    Hutasuhut, Nurman Rasyid Panusunan
    Amri, Mochamad Gani
    Aji, Rizal Fathoni
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (12) : 165 - 171
  • [26] Best Practices for the Security Evaluation of Biometric Systems
    Fernandez-Saavedra, Belen
    Sanchez-Reillo, Raul
    Liu-Jimenez, Judith
    Gutierrez Ruiz, Jorge
    2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,
  • [27] Information Security Employment: An Empirical Study
    Nelson, James A.
    Nelson, Darlene
    Nelson, Nicholas J.
    MICBE '09: PROCEEDINGS OF THE 10TH WSEAS INTERNATIONAL CONFERENCE ON MATHEMATICS AND COMPUTERS IN BUSINESS AND ECONOMICS, 2009, : 297 - +
  • [28] An Empirical Study of Security of Voip System
    Ghafarian, Ahmad
    Seno, Seyed Amin Hosseini
    Dehghani, Maria
    PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 1031 - 1036
  • [29] Weak Password Security: An Empirical Study
    Weber, James E.
    Guster, Dennis
    Safonov, Paul
    Schmidt, Mark B.
    INFORMATION SECURITY JOURNAL, 2008, 17 (01): : 45 - 54
  • [30] Software quality practices - An empirical study
    Khurana, M
    He, Z
    Court, I
    Ross, M
    Staples, G
    Wilson, D
    SOFTWARE QUALITY JOURNAL, 1996, 5 (02) : 75 - 85