Security Gap in Microservices: A Systematic Literature Review

Nurman Rasyid Panusunan Hutasuhut, Mochamad Gani Amri, Rizal Fathoni Aji

Research output: Contribution to journalArticlepeer-review

Abstract

The growing importance of microservices architecture has raised concerns about its security despite a rise in publications addressing various aspects of microservices. Security issues are particularly critical in microservices due to their complex and distributed nature, which makes them vulnerable to various types of cyber-attacks. This study aims to fill the gap in systematic investigations into microservice security by reviewing current state-of-the-art solutions and models. A total of 487 papers were analyzed, with the final selection refined to 87 relevant articles using a snowball method. This approach ensures that the focus remains on security issues, particularly those identified post-2020. However, there is still a significant lack of dedicated security standards or comprehensive models specifically designed for microservices. Key findings highlight the vulnerabilities of container-based applications, the evolving nature of cyber-attacks, and the critical need for effective access control. Moreover, a substantial knowledge gap exists between academia and industry practitioners, which compounds the challenges of securing microservices. This study emphasizes the need for more focused research on security models and guidelines to address the unique vulnerabilities of microservices and facilitate their secure integration into critical applications across various domains.

Original languageEnglish
Pages (from-to)165-171
Number of pages7
JournalInternational Journal of Advanced Computer Science and Applications
Volume15
Issue number12
DOIs
Publication statusPublished - 2024

Keywords

  • access control
  • container
  • cyber-attacks
  • Microservice security
  • security standards

Fingerprint

Dive into the research topics of 'Security Gap in Microservices: A Systematic Literature Review'. Together they form a unique fingerprint.

Cite this