Security Audit Logging in Microservice-Based Systems: Survey of Architecture Patterns
نویسندگان
چکیده
Objective. Service-oriented architecture increases technical abilities for attacker to move laterally and maintain multiple pivot points inside of compromised environment. Microservice-based infrastructure brings more challenges security architect related internal event visibility monitoring. Properly implemented logging audit approach is a baseline operations incident management. The aim this study provide helpful resource application product architects, software operation engineers on existing patterns implement trustworthy process in microservice-based environments. Method. In paper, we conduct information threats modeling systematic review major electronic databases libraries, standards presentations at the conferences as well whitepapers industry vendors with relevant products. Results practical relevance. work based research papers analysis, identified best practices its applicability depending environment characteristic. We provided threat typical pattern system 8 threats. mitigation result 11 high-level requirements were identified. High-level can be used by order secure their products
منابع مشابه
Ensuring and Assessing Architecture Conformance to Microservice Decomposition Patterns
Microservice-based software architecture design has been widely discussed, and best practices have been published as architecture design patterns. However, conformance to those patterns is hard to ensure and assess automatically, leading to problems such as architectural drift and erosion, especially in the context of continued software evolution or large-scale microservice systems. In addition...
متن کاملExtended Software Architecture Based on Security Patterns
One of the major activities in software design is defining software architecture. Before designing software structure and software behavior we have to define its architecture. In this paper we have proposed three-tiered software architecture. This software architecture extends application logic tier with security. We have implemented two important security issues: authentication and authorizati...
متن کاملanalyzing patterns of classroom interaction in efl classrooms in iran
با به کار گیری روش گفتما ن شنا سی در تحقیق حا ضر گفتا ر میا ن آموزگا را ن و زبا ن آموزا ن در کلا سهای زبا ن انگلیسی در ایرا ن مورد بررسی قرار گرفت. ا هداف تحقیق عبا رت بودند از: الف) شنا سا ئی سا ختارهای ارتبا ط گفتا ری میا ن معلمین و زبا ن آموزا ن ب) بررسی تا ثیر نقش جنسیت دبیرا ن و زبا ن آموزان بر سا ختا رهای ارتبا ط گفتا ری میا ن آنها پ) مشخص کردن اینکه آ یا آموزگاران غا لب بر این ارتبا ط گف...
A survey on security patterns
Security has become an important topic for many software systems. Security patterns are reusable solutions to security problems. Although many security patterns and techniques for using them have been proposed, it is still difficult to adapt security patterns to each phase of software development. This paper provides a survey of approaches to security patterns. As a result of classifying these ...
متن کاملPiranha Audit: Kernel Enhancements And Utilities To Improve Audit/Logging
This paper presents a mechanism to enrich logging as required in TCSEC [1] document to detect and stop possible intrusions based on typical attacks and to protect the sensible audit data from deletion/modification even in root compromise situation. After installing Piranha Audit, administrators will have a solid infrastructure for improving security and resistance to penetration, with only mode...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ??????? ?????????????????
سال: 2021
ISSN: ['2311-3456']
DOI: https://doi.org/10.21681/2311-3456-2021-2-71-80