Security Audit Logging in Microservice-Based Systems: Survey of Architecture Patterns

نویسندگان

چکیده

Objective. Service-oriented architecture increases technical abilities for attacker to move laterally and maintain multiple pivot points inside of compromised environment. Microservice-based infrastructure brings more challenges security architect related internal event visibility monitoring. Properly implemented logging audit approach is a baseline operations incident management. The aim this study provide helpful resource application product architects, software operation engineers on existing patterns implement trustworthy process in microservice-based environments. Method. In paper, we conduct information threats modeling systematic review major electronic databases libraries, standards presentations at the conferences as well whitepapers industry vendors with relevant products. Results practical relevance. work based research papers analysis, identified best practices its applicability depending environment characteristic. We provided threat typical pattern system 8 threats. mitigation result 11 high-level requirements were identified. High-level can be used by order secure their products

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ensuring and Assessing Architecture Conformance to Microservice Decomposition Patterns

Microservice-based software architecture design has been widely discussed, and best practices have been published as architecture design patterns. However, conformance to those patterns is hard to ensure and assess automatically, leading to problems such as architectural drift and erosion, especially in the context of continued software evolution or large-scale microservice systems. In addition...

متن کامل

Extended Software Architecture Based on Security Patterns

One of the major activities in software design is defining software architecture. Before designing software structure and software behavior we have to define its architecture. In this paper we have proposed three-tiered software architecture. This software architecture extends application logic tier with security. We have implemented two important security issues: authentication and authorizati...

متن کامل

analyzing patterns of classroom interaction in efl classrooms in iran

با به کار گیری روش گفتما ن شنا سی در تحقیق حا ضر گفتا ر میا ن آموزگا را ن و زبا ن آموزا ن در کلا سهای زبا ن انگلیسی در ایرا ن مورد بررسی قرار گرفت. ا هداف تحقیق عبا رت بودند از: الف) شنا سا ئی سا ختارهای ارتبا ط گفتا ری میا ن معلمین و زبا ن آموزا ن ب) بررسی تا ثیر نقش جنسیت دبیرا ن و زبا ن آموزان بر سا ختا رهای ارتبا ط گفتا ری میا ن آنها پ) مشخص کردن اینکه آ یا آموزگاران غا لب بر این ارتبا ط گف...

A survey on security patterns

Security has become an important topic for many software systems. Security patterns are reusable solutions to security problems. Although many security patterns and techniques for using them have been proposed, it is still difficult to adapt security patterns to each phase of software development. This paper provides a survey of approaches to security patterns. As a result of classifying these ...

متن کامل

Piranha Audit: Kernel Enhancements And Utilities To Improve Audit/Logging

This paper presents a mechanism to enrich logging as required in TCSEC [1] document to detect and stop possible intrusions based on typical attacks and to protect the sensible audit data from deletion/modification even in root compromise situation. After installing Piranha Audit, administrators will have a solid infrastructure for improving security and resistance to penetration, with only mode...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ??????? ?????????????????

سال: 2021

ISSN: ['2311-3456']

DOI: https://doi.org/10.21681/2311-3456-2021-2-71-80