2020
DOI: 10.21681/2311-3456-2020-04-32-43
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and Authorization in Microservice-Based Systems: Survey of Architecture Patterns

Abstract: Objective. Service-oriented architecture and its microservice-based approach increase an attack surface of applications. Exposed microservices become a pivot point for advanced persistent threats and completely change the threat landscape. Correctly implemented authentication and authorization architecture patterns are basis of any software maturity program. The aim of this study is to provide a helpful resource to application security architect and developers on existing architecture patterns to implement aut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 21 publications
0
2
0
1
Order By: Relevance
“…Access control in microservices refers to the mechanisms used to regulate and manage the access and permissions at edge level, service level and context of identity of different services and users of the system’s resources [ 14 ]. In the model of an access control of distributed architecture of microservices, proposed by the authors in [ 15 ], the private API gateway is only available to the internal microservice, the so-called front-end of microservices.…”
Section: Related Work On Access Control In Microservicesmentioning
confidence: 99%
“…Access control in microservices refers to the mechanisms used to regulate and manage the access and permissions at edge level, service level and context of identity of different services and users of the system’s resources [ 14 ]. In the model of an access control of distributed architecture of microservices, proposed by the authors in [ 15 ], the private API gateway is only available to the internal microservice, the so-called front-end of microservices.…”
Section: Related Work On Access Control In Microservicesmentioning
confidence: 99%
“…NIST published standards 29,30 on microservice-based system security. NIST analyzed the multiple implementation options available for each individual core security feature (authentication and access management, service discovery, secure communication protocols, security monitoring, availability/resiliency improvement techniques, load balancing and throttling, integrity assurance techniques and handling of session persistence) and configuration options in architectural frameworks, and devel-oped security strategies that counter threats specific to microservice-based systems.…”
Section: Related Workmentioning
confidence: 99%
“…The challenges requires novel methods of monitoring and threat detection even based machine learning techniques [21,22] that take into account the specificity of microservice operations. 30 Аннотация Цель статьи. Использование сервис-ориентированной архитектуры и микросервисного подхода при проектировании программного обеспечения увеличивает поверхность атаки и вероятность успешной реализации угроз безопасности информации.…”
Section: Conclusion and Further Workunclassified