An empirical study of security practices for microservices systems

被引:3
|
作者
Nasab, Ali Rezaei [1 ]
Shahin, Mojtaba [2 ]
Raviz, Seyed Ali Hoseyni [1 ]
Liang, Peng [1 ]
Mashmool, Amir [3 ]
Lenarduzzi, Valentina [4 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Peoples R China
[2] RMIT Univ, Sch Comp Technol, Melbourne 3000, Australia
[3] Univ Genoa, Dept Comp Sci Bioengn Robot & Syst Engn, I-16126 Genoa, Italy
[4] Univ Oulu, Fac Informat Technol & Elect Engn, Oulu 90014, Finland
关键词
Microservice; Security; Empirical study; Practitioners; Practice;
D O I
10.1016/j.jss.2022.111563
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Despite the numerous benefits of microservices systems, security has been a critical issue in such systems. Several factors explain this difficulty, including a knowledge gap among microservices practitioners on properly securing a microservices system. To (partially) bridge this gap, we conducted an empirical study. We first manually analyzed 861 microservices security points, including 567 issues, 9 documents, and 3 wiki pages from 10 GitHub open-source microservices systems and 306 Stack Overflow posts concerning security in microservices systems. In this study, a microservices security point is referred to as "a GitHub issue, a Stack Overflow post, a document, or a wiki page that entails 5 or more microservices security paragraphs". Our analysis led to a catalog of 28 microservices security practices. We then ran a survey with 74 microservices practitioners to evaluate the usefulness of these 28 practices. Our findings demonstrate that the survey respondents affirmed the usefulness of the 28 practices. We believe that the catalog of microservices security practices can serve as a valuable resource for microservices practitioners to more effectively address security issues in microservices systems. It can also inform the research community of the required or less explored areas to develop microservices-specific security practices and tools.(c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] Search-based Security Testing of Enterprise Microservices
    Seran, Susruthan
    2024 IEEE CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION, ICST 2024, 2024, : 463 - 465
  • [42] Extraction of Configurable and Reusable Microservices from Legacy Systems: An Exploratory Study
    Carvalho, Luiz
    Garcia, Alessandro
    Assuncao, Wesley K. G.
    Bonifacio, Rodrigo
    Tizzei, Leonardo P.
    Colanzi, Thelma Elita
    SPLC'19: PROCEEDINGS OF THE 23RD INTERNATIONAL SYSTEMS AND SOFTWARE PRODUCT LINE CONFERENCE, VOL A, 2020, : 26 - 31
  • [43] Techniques and Tools for Runtime Security Monitoring and Analysis of Microservices
    Castro, Jessica
    Laranjeiro, Nuno
    Vieira, Marco
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 191 - 193
  • [44] Assuring the Evolvability of Microservices: Insights into Industry Practices and Challenges
    Bogner, Justus
    Fritzsch, Jonas
    Wagner, Stefan
    Zimmermann, Alfred
    2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2019), 2019, : 546 - 556
  • [45] Electronic signatures and security issues: An empirical study
    Srivastava, A.
    Computer Law and Security Review, 2009, 25 (05): : 432 - 446
  • [46] Demographic Factors in Cyber Security: An Empirical Study
    Mittal, Shweta
    Ilavarasan, P. Vigneswara
    DIGITAL TRANSFORMATION FOR A SUSTAINABLE SOCIETY IN THE 21ST CENTURY, 2019, 11701 : 667 - 676
  • [47] An Empirical Study of Malicious Threads in Security Forums
    Gharibshah, Joobin
    Gharibshah, Zhabiz
    Papalexakis, Evangelos E.
    Faloutsos, Michalis
    COMPANION OF THE WORLD WIDE WEB CONFERENCE (WWW 2019 ), 2019, : 176 - 182
  • [48] An Empirical Study of the Military IoT Security Priorities
    Jung, Seung-hoon
    An, Jae-choon
    Park, Jin-young
    Shin, Yong-tae
    Kim, Jong-bae
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 13 - 22
  • [49] Empirical Study of Email Security Threats and Countermeasures
    Nagamalai, Dhinaharan
    Dhinakaran, Beatrice Cynthia
    Ozcan, Abdulkadir
    Okatan, Ali
    Lee, Jae-Kwang
    NETWORKS AND COMMUNICATIONS (NETCOM2013), 2014, 284 : 229 - 242
  • [50] An Empirical Study on the Effectiveness of Common Security Measures
    Harrison, Keith
    White, Gregory
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 1939 - 1945