Sidecar-based Path-aware Security for Microservices

6Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Microservice architectures decompose web applications into loosely-coupled, distributed components that interact with each other to provide an overall service. While this popular software architecture paradigm has many advantages in development and deployment, it also introduces a wider attack surface that is vulnerable to both internal and external attackers. Potentially malicious third-party services or software packages, as well as increased communication endpoints, introduce a wide array of security concerns. To improve the resiliency of microservice-based applications, many of which store sensitive data, we propose a novel, path-based anomaly detection and access control infrastructure that requires no modifications to existing software. We propose leveraging trusted proxies deployed alongside each service for request inspection, anomaly detection and signed token propagation for end-user path validation. Our approach reduces the trusted computing base away from the microservices to a smaller set of components that allow for less trust and a smaller attack surface.

Cite

CITATION STYLE

APA

Meadows, C., Hounsinou, S., Wood, T., & Bloom, G. (2023). Sidecar-based Path-aware Security for Microservices. In Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT (pp. 157–162). Association for Computing Machinery. https://doi.org/10.1145/3589608.3594742

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free