Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
173 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Microservice Vulnerability Analysis: A Literature Review with Empirical Insights (2408.03960v1)

Published 31 Jul 2024 in cs.CR and cs.SE

Abstract: Microservice architectures are revolutionizing both small businesses and large corporations, igniting a new era of innovation with their exceptional advantages in maintainability, reusability, and scalability. However, these benefits come with significant security challenges, as the increased complexity of service interactions, expanded attack surfaces, and intricate dependency management introduce a new array of cybersecurity vulnerabilities. While security concerns are mounting, there is a lack of comprehensive research that integrates a review of existing knowledge with empirical analysis of microservice vulnerabilities. This study aims to fill this gap by gathering, analyzing, and synthesizing existing literature on security vulnerabilities associated with microservice architectures. Through a thorough examination of 62 studies, we identify, analyze, and report 126 security vulnerabilities inherent in microservice architectures. This comprehensive analysis enables us to (i) propose a taxonomy that categorizes microservice vulnerabilities based on the distinctive features of microservice architectures; (ii) conduct an empirical analysis by performing vulnerability scans on four diverse microservice benchmark applications using three different scanning tools to validate our taxonomy; and (iii) map our taxonomy vulnerabilities with empirically identified vulnerabilities, providing an in-depth vulnerability analysis at microservice, application, and scanning tool levels. Our study offers crucial guidelines for practitioners and researchers to advance both the state-of-the-practice and the state-of-the-art in securing microservice architectures.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (250)
  1. G. Blinowski, A. Ojdowska, and A. Przybyłek, “Monolithic vs. microservice architecture: A performance and scalability evaluation,” IEEE Access, vol. 10, pp. 20 357–20 374, 2022.
  2. S. Luo, C. Lin, K. Ye, G. Xu, L. Zhang, G. Yang, H. Xu, and C. Xu, “Optimizing resource management for shared microservices: a scalable system design,” ACM Transactions on Computer Systems, vol. 42, no. 1-2, pp. 1–28, 2024.
  3. E. Pimentel, W. Pereira, P. H. M. Maia, M. I. Cortés et al., “Self-adaptive microservice-based systems-landscape and research opportunities,” in International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).   IEEE, 2021, pp. 167–178.
  4. V. Velepucha and P. Flores, “A survey on microservices architecture: Principles, patterns and migration challenges.” IEEE Access, 2023.
  5. A. Gördén, “Predicting resource usage on a kubernetes platform using machine learning methods,” 2023.
  6. H. Ahmad, C. Treude, M. Wagner, and C. Szabo, “Smart hpa: A resource-efficient horizontal pod auto-scaler for microservice architectures,” arXiv preprint arXiv:2403.07909, 2024.
  7. M. Abdulsatar, H. Ahmad, D. Goel, and F. Ullah, “Towards deep learning enabled cybersecurity risk assessment for microservice architectures,” arXiv preprint arXiv:2403.15169, 2024.
  8. N. Mateus-Coelho, M. Cruz-Cunha, and L. G. Ferreira, “Security in microservices architectures,” Procedia Computer Science, vol. 181, pp. 1225–1236, 2021.
  9. N. Dragoni, S. Giallorenzo, A. L. Lafuente, M. Mazzara, F. Montesi, R. Mustafin, and L. Safina, “Microservices: yesterday, today, and tomorrow,” Present and ulterior software engineering, pp. 195–216, 2017.
  10. E. Shmeleva et al., “How microservices are changing the security landscape,” Master’s thesis, 2020.
  11. P. Nkomo and M. Coetzee, “Software development activities for secure microservices,” in Computational Science and Its Applications–ICCSA 2019: 19th International Conference, Saint Petersburg, Russia, July 1–4, 2019, Proceedings, Part V 19.   Springer, 2019, pp. 573–585.
  12. D. Yu, Y. Jin, Y. Zhang, and X. Zheng, “A survey on security issues in services communication of microservices-enabled fog applications,” Concurrency and Computation: Practice and Experience, vol. 31, no. 22, p. e4436, 2019.
  13. R. K. Jayalath, H. Ahmad, D. Goel, M. Shuja, and F. Ullah, “Microservice security: A systematization of knowledge and empirical analysis,” https://github.com/Rocket-Kay/Research_Project, 2024.
  14. A. Hannousse and S. Yahiouche, “Securing microservices and microservice architectures: A systematic mapping study,” Computer Science Review, vol. 41, p. 100415, 2021.
  15. L. De Lauretis, “From monolithic architecture to microservices architecture,” in 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW).   IEEE, 2019, pp. 93–96.
  16. T. Salah, M. J. Zemerly, C. Y. Yeun, M. Al-Qutayri, and Y. Al-Hammadi, “The evolution of distributed systems towards microservices architecture,” in 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST).   IEEE, 2016, pp. 318–325.
  17. M. Waseem, P. Liang, and M. Shahin, “A systematic mapping study on microservices architecture in devops,” Journal of Systems and Software, vol. 170, p. 110798, 2020.
  18. D. Goel, A. Neumann, F. Neumann, H. Nguyen, and M. Guo, “Evolving reinforcement learning environment to minimize learner’s achievable reward: An application on hardening active directory systems,” in Proceedings of the Genetic and Evolutionary Computation Conference, 2023, pp. 1348–1356.
  19. A. Andriyanto, R. Doss, and P. Yustianto, “Adopting soa and microservices for inter-enterprise architecture in sme communities,” in 2019 International Conference on Electrical, Electronics and Information Engineering (ICEEIE), vol. 6.   IEEE, 2019, pp. 282–287.
  20. N. A. Sani, W. A. Fillah, A. Tjahyanto, and H. Suryotrisongko, “Development of microservice based application e-inkubator: Incubation and investment service provider for smes,” Procedia Computer Science, vol. 161, pp. 1064–1071, 2019.
  21. D. Kalubowila, S. Athukorala, B. S. Tharaka, H. R. Samarasekara, U. S. S. S. Arachchilage, and D. Kasthurirathna, “Optimization of microservices security,” in 2021 3rd International Conference on Advancements in Computing (ICAC).   IEEE, 2021, pp. 49–54.
  22. K. A. Torkura, M. I. Sukmana, A. V. Kayem, F. Cheng, and C. Meinel, “A cyber risk based moving target defense mechanism for microservice architectures,” in 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom).   IEEE, 2018, pp. 932–939.
  23. G. Dell’Immagine, J. Soldani, and A. Brogi, “Kubehound: Detecting microservices’ security smells in kubernetes deployments,” Future Internet, vol. 15, no. 7, p. 228, 2023.
  24. M. G. de Almeida and E. D. Canedo, “Authentication and authorization in microservices architecture: A systematic literature review,” Applied Sciences, vol. 12, no. 6, p. 3023, 2022.
  25. X. He and X. Yang, “Authentication and authorization of end user in microservice architecture,” in Journal of Physics: Conference Series, vol. 910, no. 1.   IOP Publishing, 2017, p. 012060.
  26. Y. ShuLin and H. JiePing, “Research on unified authentication and authorization in microservice architecture,” in 2020 IEEE 20th international conference on communication technology (ICCT).   IEEE, 2020, pp. 1169–1173.
  27. N. Habbal, “Enhancing availability of microservice architecture: a case study on kubernetes security configurations,” 2020.
  28. Stone & Chalk: Leading Innovation Startup & Scaleup Hub https://www.stoneandchalk.com.au (Accessed: June 15, 2024).
  29. AustCyber https://www.austcyber.com (Accessed: June 8, 2024).
  30. AustCyber and Stone & Chalk Merger https://www.stoneandchalk.com.au/media-centre/stone-and-chalk-and-austcyber-merge (Accessed: June 15, 2024).
  31. Migrova - An Australia Immigration Marketplace https://migrova.com (Accessed: June 8, 2024).
  32. M. Tvaronavičienė, T. Plėta, S. Della Casa, and J. Latvys, “Cyber security management of critical energy infrastructure in national cybersecurity strategies: Cases of usa, uk, france, estonia and lithuania,” Insights into regional development, vol. 2, no. 4, pp. 802–813, 2020.
  33. M. H. Uddin, M. H. Ali, and M. K. Hassan, “Cybersecurity hazards and financial system vulnerability: a synthesis of literature,” Risk Management, vol. 22, no. 4, pp. 239–309, 2020.
  34. H. Ahmad, I. Dharmadasa, F. Ullah, and M. A. Babar, “A review on c3i systems’ security: Vulnerabilities, attacks, and countermeasures,” ACM Computing Surveys, vol. 55, no. 9, pp. 1–38, 2023.
  35. A. Olech and K. Siekierka, “Cybersecurity in saudi arabia,” Retrieved July, vol. 14, p. 2022, 2021.
  36. T. Jacobs, “Industrial-sized cyber attacks threaten the upstream sector,” Journal of petroleum technology, vol. 68, no. 03, pp. 42–50, 2016.
  37. J. Beerman, D. Berent, Z. Falter, and S. Bhunia, “A review of colonial pipeline ransomware attack,” in 2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW).   IEEE, 2023, pp. 8–15.
  38. G. Stergiopoulos, D. A. Gritzalis, and E. Limnaios, “Cyber-attacks on the oil & gas sector: A survey on incident assessment and attack patterns,” IEEE Access, vol. 8, pp. 128 440–128 475, 2020.
  39. M. Mazumder and A. Sobhan, “The spillover effect of the bangladesh bank cyber heist on banks’ cyber risk disclosures in bangladesh,” Journal of Operational Risk, vol. 15, no. 4, 2020.
  40. U. Tatar, B. Nussbaum, Y. Gokce, and O. F. Keskin, “Digital force majeure: The mondelez case, insurance, and the (un) certainty of attribution in cyberattacks,” Business Horizons, vol. 64, no. 6, pp. 775–785, 2021.
  41. M. H. Rahman, T. Wuest, and M. Shafae, “Manufacturing cybersecurity threat attributes and countermeasures: Review, meta-taxonomy, and use cases of cyberattack taxonomies,” Journal of Manufacturing Systems, vol. 68, pp. 196–208, 2023.
  42. A. Elsaleiby, “The moderation effect of information security orientation on the relationship between information technology enablement and supply chains agility performance,” IEEE Engineering Management Review, 2024.
  43. P. Haindl, P. Kochberger, and M. Sveggen, “A systematic literature review of inter-service security threats and mitigation strategies in microservice architectures,” IEEE Access, 2024.
  44. D. Berardi, S. Giallorenzo, J. Mauro, A. Melis, F. Montesi, and M. Prandini, “Microservice security: a systematic literature review,” PeerJ Computer Science, vol. 8, p. e779, 2022.
  45. F. Ponce, J. Soldani, H. Astudillo, and A. Brogi, “Smells and refactorings for microservices security: A multivocal literature review,” Journal of Systems and Software, vol. 192, p. 111393, 2022.
  46. A. Pereira-Vale, E. B. Fernandez, R. Monge, H. Astudillo, and G. Márquez, “Security in microservice-based systems: A multivocal literature review,” Computers & Security, vol. 103, p. 102200, 2021.
  47. K. A. Torkura, M. I. Sukmana, and C. Meinel, “Integrating continuous security assessments in microservices and cloud native applications,” in Proceedings of the10th International Conference on Utility and Cloud Computing, 2017, pp. 171–180.
  48. N. Chondamrongkul, J. Sun, and I. Warren, “Automated security analysis for microservice architecture,” in 2020 IEEE International Conference on Software Architecture Companion (ICSA-C).   IEEE, 2020, pp. 79–82.
  49. W. Y. E. Tai Ramirez, “A framework to build secure microservice architecture,” 2023.
  50. O. Baker and Q. Nguyen, “A novel approach to secure microservice architecture from owasp vulnerabilities,” in CITRENZ Conference 2019, 2019.
  51. V. Braun and V. Clarke, “Using thematic analysis in psychology,” Qualitative research in psychology, vol. 3, no. 2, pp. 77–101, 2006.
  52. The Common Vulnerabilities and Exposures (CVE). https://nvd.nist.gov/vuln (Accessed: March 5, 2024).
  53. I. K. Aksakalli, T. Çelik, A. B. Can, and B. Tekinerdoğan, “Deployment and communication patterns in microservice architectures: A systematic literature review,” Journal of Systems and Software, vol. 180, p. 111014, 2021.
  54. M. Garriga, “Towards a taxonomy of microservices architectures,” in Software Engineering and Formal Methods, SEFM 2017 Collocated Workshops: DataMod, FAACS, MSE, CoSim-CPS, and FOCLASA, Trento, Italy, September 4-5, 2017, Revised Selected Papers, ser. Lecture Notes in Computer Science, A. Cerone and M. Roveri, Eds., vol. 10729.   Springer, 2017.
  55. P. Genfer and U. Zdun, “Avoiding excessive data exposure through microservice apis,” in European Conference on Software Architecture.   Springer, 2022, pp. 3–18.
  56. F. Rademacher, J. Sorgalla, and S. Sachweh, “Challenges of domain-driven microservice design: A model-driven perspective,” IEEE Software, vol. 35, no. 3, pp. 36–43, 2018. [Online]. Available: https://ieeexplore.ieee.org/document/8371922
  57. P. Genfer and U. Zdun, “Avoiding excessive data exposure through microservice apis,” in Proceedings of the Conference on Microservices Architectures.   Vienna, Austria: University of Vienna, 2021.
  58. R. Xu, W. Jin, and D. Kim, “Microservice security agent based on api gateway in edge computing,” Sensors, vol. 19, no. 22, p. 4905, 2019.
  59. F. Chen, L. Zhang, and X. Lian, “A systematic gray literature review: The technologies and concerns of microservice application programming interfaces,” Software: Practice and Experience, vol. 51, no. 7, pp. 1483–1508, 2021.
  60. C. K. Rudrabhatla, “Security design patterns in distributed microservice architecture,” arXiv preprint arXiv:2008.03395, 2020.
  61. A. Pereira-Vale, E. B. Fernandez, R. Monge, H. Astudillo, and G. Márquez, “Security in microservice-based systems: A multivocal literature review,” Computers & Security, vol. 103, p. 102200, 2021. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S016740482100015X
  62. N. Alshuqayran, N. Ali, and R. Evans, “A systematic mapping study in microservice architecture,” in 2016 IEEE 9th International Conference on Service-Oriented Computing and Applications (SOCA), University of Brighton.   Brighton, UK: IEEE, 2016, pp. 44–51.
  63. D. Loureiro, “Securing microservices: A practical approach,” Master’s thesis, University of Minho, Braga, Portugal, September 2021, master’s thesis in collaboration with Checkmarx.
  64. D. Muresu, “Investigating the security of a microservices architecture: A case study on microservice and kubernetes security,” 2021.
  65. M. G. de Almeida and E. D. Canedo, “Authentication and authorization in microservices architecture: A systematic literature review,” Applied Sciences, vol. 12, no. 3023, 2022.
  66. I. M. B. Filho et al., “A microservice-based health information system for student-run clinics,” in Computational Science and Its Applications – ICCSA 2019: 19th International Conference, Saint Petersburg, Russia, July 1–4, 2019, Proceedings, Part V.   Gewerbestrasse 11, 6330 Cham, Switzerland: Springer Nature Switzerland AG, 2019.
  67. D. V. S. Priya, S. C. Sethuraman, and M. K. Khan, “Container security: Precaution levels, mitigation strategies, and research perspectives,” Computers & Security, vol. 135, p. 103490, 2023. [Online]. Available: https://www.elsevier.com/locate/cose
  68. “Advances in service-oriented and cloud computing: International workshops of esocc 2020,” in European Conference on Service-Oriented and Cloud Computing (ESOCC) 2020 Workshops, Heraklion, Crete, Greece, September 28-30, 2020, Revised Selected Papers, ser. Communications in Computer and Information Science, C. Zirpins, I. Paraskakis et al., Eds., vol. 1360.   Cham, Switzerland: Springer Nature Switzerland AG, 2020.
  69. V. Velepucha and P. Flores, “A survey on microservices architecture: Principles, patterns, and migration challenges,” IEEE Access, vol. 11, 2023. [Online]. Available: https://ieeexplore.ieee.org/document/3305687
  70. L. A. Monteiro, W. H. C. Almeida, R. R. Hazin, A. C. de Lima, S. K. G. e Silva, and F. S. Ferraz, “A survey on microservice security–trends in architecture, privacy, and standardization on cloud computing environments,” International Journal on Advances in Security, vol. 11, no. 3 & 4, pp. 201–213, 2018.
  71. “Software architecture: 16th european conference, ecsa 2022, prague, czech republic, september 19–23, 2022, proceedings,” in Lecture Notes in Computer Science, I. Gerostathopoulos, G. Lewis, T. Batista, and T. Bureš, Eds., vol. 13444.   Cham, Switzerland: Springer Nature Switzerland AG, 2022.
  72. J. Chelladhurai, P. R. Chelliah, and S. A. Kumar, “Securing docker containers from denial of service (dos) attacks,” in 2016 IEEE International Conference on Services Computing (SCC).   Bangalore, Karnataka, India; Conway, SC, USA: IEEE, 2016, pp. 856–859.
  73. A. Pereira-Vale, G. Márquez, H. Astudillo, and E. B. Fernandez, “Security mechanisms used in microservices-based systems: A systematic mapping,” in 2019 XLV Latin American Computing Conference (CLEI).   IEEE, 2019, pp. 01–10.
  74. C. Esposito, A. Castiglione, and K.-K. R. Choo, “Challenges in delivering software in the cloud as microservices,” IEEE Cloud Computing, pp. 10–13, 2016, available: IEEE Xplore.
  75. A. Homay, A. Zoitl, M. de Sousa, M. Wollschlaeger, and C. Chrysoulas, “A survey: Microservices architecture in advanced manufacturing systems,” in 2019 IEEE Conference Proceedings.   IEEE, 2019, pp. 1165–1168, accessed: February 06, 2024. [Online]. Available: https://ieeexplore.ieee.org/document/SpecificDocumentNotProvided
  76. S. Sultan, I. Ahmad, and T. Dimitriou, “Container security: Issues, challenges, and the road ahead,” IEEE Access, vol. 7, pp. 52 976–52 993, 2019.
  77. P. Di Francesco, P. Lago, and I. Malavolta, “Architecting with microservices: A systematic mapping study,” The Journal of Systems and Software, vol. 150, pp. 77–97, 2019. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0164121219300046
  78. V. Gkioulos and S. D. Wolthusen, “Security requirements for the deployment of services across tactical soa,” in Computer Network Security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings 7.   Springer, 2017, pp. 115–127.
  79. J. Suomalainen, “Defense-in-depth methods in microservices access control,” Master’s thesis, 2019.
  80. M. Krämer, S. Frese, and A. Kuijper, “Implementing secure applications in smart city clouds using microservices,” Future Generation Computer Systems, vol. 99, pp. 308–320, 2019.
  81. A. Barczak and M. Barczak, “Performance comparison of monolith and microservices-based applications,” in Proceedings of the 25th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2021), Siedlce, Mazowieckie, Poland; Warsaw, Mazowieckie, Poland, 2021.
  82. G. Liu, B. Huang, Z. Liang, M. Qin, H. Zhou, and Z. Li, “Microservices: Architecture, container, and challenges,” in 2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C).   IEEE, 2020, pp. 629–635.
  83. I. Shabani, E. Mëziu, B. Berisha, and T. Biba, “Design of modern distributed systems based on microservices architecture,” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 12, no. 2, 2021. [Online]. Available: https://thesai.org/Publications/ViewPaper?Volume=12&Issue=2&Code=IJACSA&SerialNo=21
  84. M. Waseem, P. Liang, and M. Shahin, “A systematic mapping study on microservices architecture in devops,” The Journal of Systems & Software, vol. 170, p. 110798, 2020. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0164121220301749
  85. N. Mateus-Coelho, M. Cruz-Cunha, and L. G. Ferreira, “Securing microservices: Challenges and solutions,” Procedia Computer Science, vol. 181, pp. 1225–1236, 2021.
  86. D. Preuveneers and W. Joosen, “Access control with delegated authorization policy evaluation for data-driven microservice workflows,” Future Internet, vol. 9, no. 58, pp. 1–21, 2017. [Online]. Available: https://www.mdpi.com/journal/futureinternet
  87. M. Söylemez, B. Tekinerdogan, and A. K. Tarhan, “Feature-driven characterization of microservice architectures: A survey of the state of the practice,” Applied Sciences, vol. 12, no. 4424, 2022. [Online]. Available: https://www.mdpi.com/2076-3417/12/9/4424
  88. D. Yu, Y. Jin, Y. Zhang, and X. Zheng, “A survey on security issues in services communication of microservices-enabled fog applications,” Concurrency and Computation: Practice and Experience, vol. 31, no. e4436, 2017. [Online]. Available: https://onlinelibrary.wiley.com/doi/abs/10.1002/cpe.4436
  89. C. Esposito, A. Castiglione, C.-A. Tudorica, and F. Pop, “Security and privacy for cloud-based data management in the health network service chain: a microservice approach,” IEEE Communications Magazine, vol. 55, no. 9, pp. 102–108, 2017.
  90. T. Yarygina and A. H. Bagge, “Overcoming security challenges in microservice architectures,” in 2018 IEEE Symposium on Service-Oriented System Engineering (SOSE).   IEEE, 2018.
  91. “OWASP Top 10 API Security Risks – 2023,” https://owasp.org/API-Security/editions/2023/en/0x11-t10/, 2023, accessed: March 09, 2024.
  92. H. Samoylenko and A. Selivanova, “Features of microservices architecture in e-commerce systems,” Mathematical Machines and Systems, vol. 3, pp. 51–58, 2023.
  93. “Foundations and practice of security: 11th international symposium, fps 2018, montreal, qc, canada, november 13-15, 2018, revised selected papers,” N. Zincir-Heywood, G. Bonfante, M. Debbabi, and J. Garcia-Alfaro, Eds.   Gewerbestrasse 11, 6330 Cham, Switzerland: Springer Nature Switzerland AG, 2019.
  94. M. Driss, D. Hasan, W. Boulila, and J. Ahmad, “Microservices in iot security: Current solutions, research challenges, and future directions,” Procedia Computer Science, vol. 192, pp. 2385–2395, 2021.
  95. A. Nehme, V. Jesus, K. Mahbub, and A. Abdallah, “Fine-grained access control for microservices,” in Foundations and Practice of Security: 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13–15, 2018, Revised Selected Papers 11.   Springer, 2019, pp. 285–300.
  96. “Software technologies: Applications and foundations,” in STAF 2018 Collocated Workshops, M. Mazzara, I. Ober, and G. Salaün, Eds.   Toulouse, France: Springer Nature Switzerland AG, 2018.
  97. B. Götz, D. Schel, D. Bauer, C. Henkel, P. Einberger, and T. Bauernhansl, “Challenges of production microservices,” Procedia CIRP, vol. 67, pp. 167–172, 2018.
  98. D. Guija and M. S. Siddiqui, “Identity and access control for micro-services based 5g nfv platforms,” in Proceedings of the 13th International Conference on Availability, Reliability, and Security, 2018, pp. 1–10.
  99. S. Jalonen, “Security challenges of microservices,” B.S. thesis, S. Jalonen, 2022.
  100. V. DOHNAL, “Microservices for automated threat response to phishing.”
  101. M. Ahmadvand and A. Ibrahim, “Requirements reconciliation for scalable and secure microservice (de) composition,” in 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW).   IEEE, 2016, pp. 68–73.
  102. J. T. F. Chaves and S. A. A. de Freitas, “A systematic literature review for service-oriented architecture and agile development,” in Computational Science and Its Applications–ICCSA 2019: 19th International Conference, Saint Petersburg, Russia, July 1–4, 2019, Proceedings, Part V 19.   Springer, 2019, pp. 120–135.
  103. K. A. Torkura, M. I. Sukmana, and C. Meinel, “Integrating continuous security assessments in microservices and cloud native applications,” in Proceedings of the UCC’17 December 5–8, 2017, Austin, Texas, USA.   Association for Computing Machinery, 2017.
  104. A. Martin, S. Raponi, T. Combe, and R. D. Pietro, “Docker ecosystem - vulnerability analysis,” Computer Communications, vol. 122, pp. 30–43, 2018, available at ScienceDirect: www.elsevier.com/locate/comcom.
  105. K. Jander, L. Braubach, and A. Pokahr, “Defense-in-depth and role authentication for microservice systems,” Procedia Computer Science, vol. 130, pp. 456–463, 2018, presented at The 9th International Conference on Ambient Systems Networks and Technologies (ANT 2018).
  106. K. A. Torkura, M. I. Sukmana, A. V. Kayem, F. Cheng, and C. Meinel, “A cyber risk based moving target defense mechanism for microservice architectures,” in 2018 IEEE International Conference on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications.   IEEE, 2018.
  107. T. D. Tenev, “Development of hierarchical taxonomy that incorporates patterns for improving security in information systems based on microservice architecture,” PhD Thesis, Sofia University “St. Kliment Ohridski”, Faculty of Mathematics and Informatics, Department “Computing systems”, Sofia, 2020, for obtaining the academic title “Doctor of Philosophy” (PhD) in the field of Informatics and Computer Science.
  108. M. Bélair, S. Laniepce, and J.-M. Menaud, “Leveraging kernel security mechanisms to improve container security: a survey,” in Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019).   Canterbury, United Kingdom: ACM New York, NY, USA, 2019, p. 6.
  109. A. Singh and A. Aggarwal, “Securing microservice cicd pipelines in cloud deployments through infrastructure as code implementation approach and best practices,” Journal of Science & Technology, vol. 3, no. 3, pp. 51–65, 2022.
  110. A. Balalaie, A. Heydarnoori, and P. Jamshidi, “Microservices architecture enables devops: Migration to a cloud-native architecture,” IEEE Software, vol. 33, no. 3, pp. 42–52, 2016.
  111. S. Baškarada, V. Nguyen, and A. Koronios, “Architecting microservices: Practical opportunities and challenges,” Journal of Computer Information Systems, vol. 60, no. 5, pp. 428–436, 2020.
  112. P. Nkomo and M. Coetzee, “Development activities, tools, and techniques of secure microservices compositions,” in Information Security Practice and Experience: 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings, S.-H. Heng and J. Lopez, Eds.   Cham, Switzerland: Springer Nature Switzerland AG, 2019, pp. 423–433.
  113. P. Billawa, A. Bambhore Tukaram, N. E. Diaz Ferreyra, J.-P. Steghöfer, R. Scandariato, and G. Simhandl, “Sok: Security of microservice applications: A practitioners’ perspective on challenges and best practices,” in Proceedings of the 17th International Conference on Availability, Reliability, and Security (ARES 2022).   Vienna, Austria: ACM New York, NY, USA, August 2022, p. 10.
  114. R. Chandramouli, “Implementation of devsecops for a microservices-based application with service mesh,” NIST Special Publication, vol. 800, p. 204C, 2022.
  115. W.-T. Lee and Z.-W. Liu, “Microservices-based devsecops platform using pipeline and open source software.” Journal of Information Science & Engineering, vol. 39, no. 5, 2023.
  116. J. McZara, S. Kafle, and D. Shin, “Modeling and analysis of dependencies between microservices in devsecops,” in 2020 IEEE International Conference on Smart Cloud (SmartCloud).   IEEE, 2020, pp. 140–147.
  117. Software Vulnerability CVE-2023-28346. https://nvd.nist.gov/vuln/detail/CVE-2023-28346 (Accessed: March 5, 2024).
  118. Software Vulnerability CVE-2019-11248. https://nvd.nist.gov/vuln/detail/CVE-2019-11248 (Accessed: March 5, 2024).
  119. Software Vulnerability CVE-2023-52077. https://nvd.nist.gov/vuln/detail/CVE-2023-52077 (Accessed: March 5, 2024).
  120. Software Vulnerability CVE-2024-24771. https://nvd.nist.gov/vuln/detail/CVE-2024-24771 (Accessed: March 5, 2024).
  121. Software Vulnerability CVE-2024-4200. https://nvd.nist.gov/vuln/detail/CVE-2024-4200 (Accessed: March 5, 2024).
  122. Software Vulnerability CVE-2018-1002105. https://nvd.nist.gov/vuln/detail/CVE-2018-1002105 (Accessed: March 5, 2024).
  123. Software Vulnerability CVE-2024-21661. https://nvd.nist.gov/vuln/detail/CVE-2024-21661 (Accessed: March 5, 2024).
  124. Software Vulnerability CVE-2024-41701. https://nvd.nist.gov/vuln/detail/CVE-2024-41701 (Accessed: March 5, 2024).
  125. Software Vulnerability CVE-2020-8554. https://nvd.nist.gov/vuln/detail/CVE-2020-8554 (Accessed: March 5, 2024).
  126. Software Vulnerability CVE-2024-30381. https://nvd.nist.gov/vuln/detail/CVE-2024-30381 (Accessed: March 5, 2024).
  127. Software Vulnerability CVE-2024-28848. https://nvd.nist.gov/vuln/detail/CVE-2024-28848 (Accessed: March 5, 2024).
  128. Software Vulnerability CVE-2022-39388. https://nvd.nist.gov/vuln/detail/CVE-2022-39388 (Accessed: March 5, 2024).
  129. M. Jin, A. Lv, Y. Zhu, Z. Wen, Y. Zhong, Z. Zhao, J. Wu, H. Li, H. He, and F. Chen, “An anomaly detection algorithm for microservice architecture based on robust principal component analysis,” IEEE Access, vol. 8, pp. 226 397–226 408, 2020.
  130. Software Vulnerability CVE-2023-6229. https://nvd.nist.gov/vuln/detail/CVE-2023-6229 (Accessed: March 6, 2024).
  131. Software Vulnerability CVE-2024-40632. https://nvd.nist.gov/vuln/detail/CVE-2024-40632 (Accessed: March 5, 2024).
  132. Software Vulnerability CVE-2024-25124. https://nvd.nist.gov/vuln/detail/CVE-2024-25124 (Accessed: March 5, 2024).
  133. Software Vulnerability CVE-2024-3384. https://nvd.nist.gov/vuln/detail/CVE-2024-3384 (Accessed: March 5, 2024).
  134. Software Vulnerability CVE-2018-15664. https://nvd.nist.gov/vuln/detail/CVE-2018-15664 (Accessed: March 5, 2024).
  135. Software Vulnerability CVE-2020-7802. https://nvd.nist.gov/vuln/detail/CVE-2020-7802 (Accessed: March 5, 2024).
  136. Software Vulnerability CVE-2016-2183. https://nvd.nist.gov/vuln/detail/CVE-2016-2183 (Accessed: March 5, 2024).
  137. Software Vulnerability CVE-2024-28872. https://nvd.nist.gov/vuln/detail/CVE-2024-28872 (Accessed: March 6, 2024).
  138. Software Vulnerability CVE-2018-7750. https://nvd.nist.gov/vuln/detail/CVE-2018-7750 (Accessed: March 6, 2024).
  139. Software Vulnerability CVE-2016-0733. https://nvd.nist.gov/vuln/detail/CVE-2016-0733 (Accessed: March 6, 2024).
  140. Software Vulnerability CVE-2024-25124. https://nvd.nist.gov/vuln/detail/CVE-2024-25124 (Accessed: March 6, 2024).
  141. Software Vulnerability CVE-2024-25731. https://nvd.nist.gov/vuln/detail/CVE-2024-25731 (Accessed: March 6, 2024).
  142. Software Vulnerability CVE-2023-48840. https://nvd.nist.gov/vuln/detail/CVE-2023-48840 (Accessed: March 6, 2024).
  143. Software Vulnerability CVE-2018-6389. https://nvd.nist.gov/vuln/detail/CVE-2018-6389 (Accessed: March 6, 2024).
  144. Software Vulnerability CVE-2023-20155. https://nvd.nist.gov/vuln/detail/CVE-2023-20155 (Accessed: March 6, 2024).
  145. Software Vulnerability 2023-20155. https://nvd.nist.gov/vuln/detail/2023-20155 (Accessed: March 6, 2024).
  146. Software Vulnerability CVE-2024-0555. https://nvd.nist.gov/vuln/detail/CVE-2024-0555 (Accessed: March 6, 2024).
  147. Software Vulnerability CVE-2023-4420. https://nvd.nist.gov/vuln/detail/CVE-2023-4420 (Accessed: March 6, 2024).
  148. Software Vulnerability CVE-2023-2986. https://nvd.nist.gov/vuln/detail/CVE-2023-2986 (Accessed: March 6, 2024).
  149. Software Vulnerability CVE-2024-22432. https://nvd.nist.gov/vuln/detail/CVE-2024-22432 (Accessed: March 6, 2024).
  150. Software Vulnerability CVE-2023-27860 . https://nvd.nist.gov/vuln/detail/CVE-2023-27860 (Accessed: March 6, 2024).
  151. Software Vulnerability CVE-2020-0601. https://nvd.nist.gov/vuln/detail/CVE-2020-0601 (Accessed: March 6, 2024).
  152. Software Vulnerability CVE-2024-33551. https://nvd.nist.gov/vuln/detail/CVE-2024-33551 (Accessed: March 6, 2024).
  153. Software Vulnerability CVE-2024-5385. https://nvd.nist.gov/vuln/detail/CVE-2024-5385 (Accessed: March 6, 2024).
  154. Software Vulnerability CVE-2019-12735. https://nvd.nist.gov/vuln/detail/CVE-2019-12735 (Accessed: March 6, 2024).
  155. Software Vulnerability CVE-2019-2725. https://nvd.nist.gov/vuln/detail/CVE-2019-2725 (Accessed: March 6, 2024).
  156. Software Vulnerability CVE-2024-5128. https://nvd.nist.gov/vuln/detail/CVE-2024-5128 (Accessed: March 6, 2024).
  157. Software Vulnerability CVE-2024-29210. https://nvd.nist.gov/vuln/detail/CVE-2024-29210 (Accessed: March 6, 2024).
  158. Software Vulnerability CVE-2024-0865. https://nvd.nist.gov/vuln/detail/CVE-2024-0865 (Accessed: March 6, 2024).
  159. Software Vulnerability CVE-2024-2338. https://nvd.nist.gov/vuln/detail/CVE-2024-2338 (Accessed: March 6, 2024).
  160. Software Vulnerability CVE-2024-5558. https://nvd.nist.gov/vuln/detail/CVE-2024-5558 (Accessed: March 6, 2024).
  161. Software Vulnerability CVE-2023-34362. https://nvd.nist.gov/vuln/detail/CVE-2023-34362 (Accessed: March 6, 2024).
  162. Software Vulnerability CVE-2024-6778. https://nvd.nist.gov/vuln/detail/CVE-2024-6778 (Accessed: March 6, 2024).
  163. Software Vulnerability CVE-2024-2032. https://nvd.nist.gov/vuln/detail/CVE-2024-2032 (Accessed: March 6, 2024).
  164. Software Vulnerability CVE-2023-6271. https://nvd.nist.gov/vuln/detail/CVE-2023-6271 (Accessed: March 6, 2024).
  165. Software Vulnerability CVE-2023-5808. https://nvd.nist.gov/vuln/detail/CVE-2023-5808 (Accessed: March 6, 2024).
  166. Software Vulnerability CVE-2023-6553. https://nvd.nist.gov/vuln/detail/CVE-2023-6553 (Accessed: March 6, 2024).
  167. Software Vulnerability CVE-2024-20358. https://nvd.nist.gov/vuln/detail/CVE-2024-20358 (Accessed: March 6, 2024).
  168. Software Vulnerability CVE-2014-0160. https://nvd.nist.gov/vuln/detail/cve-2014-0160 (Accessed: March 6, 2024).
  169. Software Vulnerability CVE-2021-29659. https://nvd.nist.gov/vuln/detail/CVE-2021-29659 (Accessed: March 6, 2024).
  170. Software Vulnerability CVE-2024-5967. https://nvd.nist.gov/vuln/detail/CVE-2024-5967 (Accessed: March 6, 2024).
  171. Software Vulnerability CVE-2024-21643. https://nvd.nist.gov/vuln/detail/CVE-2024-21643 (Accessed: March 6, 2024).
  172. Software Vulnerability CVE-2024-24830. https://nvd.nist.gov/vuln/detail/CVE-2024-24830 (Accessed: March 6, 2024).
  173. Software Vulnerability CVE-2024-27782. https://nvd.nist.gov/vuln/detail/CVE-2024-27782 (Accessed: March 6, 2024).
  174. Software Vulnerability CVE-2024-20395. https://nvd.nist.gov/vuln/detail/CVE-2024-20395 (Accessed: March 6, 2024).
  175. Software Vulnerability CVE-2024-39208. https://nvd.nist.gov/vuln/detail/CVE-2024-39208 (Accessed: March 6, 2024).
  176. Software Vulnerability CVE-2023-38489. https://nvd.nist.gov/vuln/detail/CVE-2023-38489 (Accessed: March 6, 2024).
  177. Software Vulnerability CVE-2023-7028. https://nvd.nist.gov/vuln/detail/cve-2023-7028 (Accessed: March 6, 2024).
  178. Software Vulnerability CVE-2019-11510. https://nvd.nist.gov/vuln/detail/CVE-2019-11510 (Accessed: March 7, 2024).
  179. D. Goel and A. K. Jain, “Mobile phishing attacks and defence mechanisms: State of art and open research challenges,” Computers & Security, vol. 73, pp. 519–544, 2018.
  180. Software Vulnerability CVE-2019-16759. https://nvd.nist.gov/vuln/detail/CVE-2019-16759 (Accessed: March 8, 2024).
  181. Software Vulnerability CVE-2021-44877. https://nvd.nist.gov/vuln/detail/CVE-2021-44877 (Accessed: March 6, 2024).
  182. Software Vulnerability CVE-2021-41635 . https://nvd.nist.gov/vuln/detail/CVE-2021-41635 (Accessed: March 9, 2024).
  183. Software Vulnerability CVE-2024-5166. https://nvd.nist.gov/vuln/detail/CVE-2024-5166 (Accessed: March 8, 2024).
  184. Software Vulnerability CVE-2021-40444. https://nvd.nist.gov/vuln/detail/CVE-2021-40444 (Accessed: March 8, 2024).
  185. Software Vulnerability CVE-2017-3506. https://nvd.nist.gov/vuln/detail/CVE-2017-3506 (Accessed: March 8, 2024).
  186. Software Vulnerability CVE-2023-38001. https://nvd.nist.gov/vuln/detail/CVE-2023-38001 (Accessed: March 9, 2024).
  187. Software Vulnerability CVE-2022-39801. https://nvd.nist.gov/vuln/detail/CVE-2022-39801 (Accessed: March 9, 2024).
  188. Software Vulnerability CVE-2019-16782. https://nvd.nist.gov/vuln/detail/CVE-2019-16782 (Accessed: March 8, 2024).
  189. Software Vulnerability CVE-2019-5736. https://nvd.nist.gov/vuln/detail/CVE-2019-5736 (Accessed: March 5, 2024).
  190. Software Vulnerability CVE-2020-15257. https://nvd.nist.gov/vuln/detail/CVE-2020-15257 (Accessed: March 5, 2024).
  191. Software Vulnerability CVE-2023-38275. https://nvd.nist.gov/vuln/detail/CVE-2023-38275 (Accessed: March 5, 2024).
  192. Software Vulnerability CVE-2018-14620. https://nvd.nist.gov/vuln/detail/CVE-2018-14620 (Accessed: March 5, 2024).
  193. Software Vulnerability CVE-2024-36819. https://nvd.nist.gov/vuln/detail/CVE-2024-36819 (Accessed: March 5, 2024).
  194. Software Vulnerability CVE-2013-6426. https://nvd.nist.gov/vuln/detail/CVE-2013-6426 (Accessed: March 5, 2024).
  195. Software Vulnerability CVE-2024-4146. https://nvd.nist.gov/vuln/detail/CVE-2024-4146 (Accessed: March 5, 2024).
  196. Software Vulnerability CVE-2021-25742. https://nvd.nist.gov/vuln/detail/CVE-2021-25742 (Accessed: March 9, 2024).
  197. Software Vulnerability CVE-2022-20308. https://nvd.nist.gov/vuln/detail/CVE-2022-20308 (Accessed: March 9, 2024).
  198. Software Vulnerability CVE-2020-16898. https://nvd.nist.gov/vuln/detail/CVE-2020-16898 (Accessed: March 9, 2024).
  199. Software Vulnerability CVE-2023-33372. https://nvd.nist.gov/vuln/detail/CVE-2023-33372 (Accessed: March 9, 2024).
  200. Software Vulnerability CVE-2007-1741. https://nvd.nist.gov/vuln/detail/CVE-2007-1741 (Accessed: March 9, 2024).
  201. Software Vulnerability CVE-2023-38295. https://nvd.nist.gov/vuln/detail/CVE-2023-38295 (Accessed: March 9, 2024).
  202. Software vulnerability cve-2024-3234. https://nvd.nist.gov/vuln/detail/CVE-2024-3234 (Accessed: March 9, 2024).
  203. Software vulnerability cve-2019-15591. https://nvd.nist.gov/vuln/detail/CVE-2019-15591 (Accessed: March 9, 2024).
  204. Software vulnerability cve-2013-6623. https://nvd.nist.gov/vuln/detail/CVE-2013-6623 (Accessed: March 9, 2024).
  205. Software vulnerability cve-2021-47542. https://nvd.nist.gov/vuln/detail/CVE-2021-47542 (Accessed: March 9, 2024).
  206. Software Vulnerability CVE-2017-5638. https://nvd.nist.gov/vuln/detail/CVE-2017-5638 (Accessed: March 6, 2024).
  207. Software Vulnerability CVE-2020-5902. https://nvd.nist.gov/vuln/detail/CVE-2020-5902 (Accessed: March 9, 2024).
  208. Software Vulnerability CVE-2017-0144. https://nvd.nist.gov/vuln/detail/CVE-2017-0144 (Accessed: March 9, 2024).
  209. Software Vulnerability CVE-2018-5547. https://nvd.nist.gov/vuln/detail/CVE-2018-5547 (Accessed: March 9, 2024).
  210. Software Vulnerability CVE-2015-4475. https://nvd.nist.gov/vuln/detail/CVE-2015-4475 (Accessed: March 9, 2024).
  211. Software Vulnerability CVE-2020-8559. https://nvd.nist.gov/vuln/detail/CVE-2020-8559 (Accessed: March 6, 2024).
  212. Software Vulnerability CVE-2024-41656. https://nvd.nist.gov/vuln/detail/CVE-2024-41656 (Accessed: March 6, 2024).
  213. Software Vulnerability CVE-2024-23332. https://nvd.nist.gov/vuln/detail/CVE-2024-23332 (Accessed: March 6, 2024).
  214. Software Vulnerability CVE-2024-21815. https://nvd.nist.gov/vuln/detail/CVE-2024-21815 (Accessed: March 6, 2024).
  215. Software Vulnerability CVE-2024-3454. https://nvd.nist.gov/vuln/detail/CVE-2024-3454 (Accessed: March 6, 2024).
  216. Software Vulnerability CVE-2023-7224. https://nvd.nist.gov/vuln/detail/CVE-2023-7224 (Accessed: March 6, 2024).
  217. Software Vulnerability CVE-2024-41944. https://nvd.nist.gov/vuln/detail/CVE-2024-41944 (Accessed: March 6, 2024).
  218. Software Vulnerability CVE-2024-37165. https://nvd.nist.gov/vuln/detail/CVE-2024-37165 (Accessed: March 6, 2024).
  219. Software Vulnerability CVE-2024-6152. https://nvd.nist.gov/vuln/detail/CVE-2024-6152 (Accessed: March 6, 2024).
  220. Software Vulnerability CVE-2024-21312. https://nvd.nist.gov/vuln/detail/CVE-2024-21312 (Accessed: March 6, 2024).
  221. Software Vulnerability CVE-2023-31997. https://nvd.nist.gov/vuln/detail/CVE-2023-31997 (Accessed: March 6, 2024).
  222. Software Vulnerability CVE-2019-9946. https://nvd.nist.gov/vuln/detail/CVE-2019-9946 (Accessed: March 6, 2024).
  223. Software Vulnerability CVE-2024-30247. https://nvd.nist.gov/vuln/detail/CVE-2024-30247 (Accessed: March 6, 2024).
  224. Software Vulnerability CVE-2022-4390. https://nvd.nist.gov/vuln/detail/CVE-2022-4390 (Accessed: March 6, 2024).
  225. S. Throner, H. Hütter, N. Sänger, M. Schneider, S. Hanselmann, P. Petrovic, and S. Abeck, “An advanced devops environment for microservice-based applications,” in 2021 IEEE International Conference on Service-Oriented System Engineering (SOSE).   IEEE, 2021, pp. 134–143.
  226. Software Vulnerability CVE-2022-28145. https://nvd.nist.gov/vuln/detail/CVE-2022-28145 (Accessed: March 5, 2024).
  227. Software Vulnerability CVE-2022-22984. https://nvd.nist.gov/vuln/detail/CVE-2022-22984 (Accessed: March 5, 2024).
  228. Software Vulnerability CVE-2019-16574. https://nvd.nist.gov/vuln/detail/CVE-2019-16574 (Accessed: March 5, 2024).
  229. Software Vulnerability CVE-2020-5252. https://nvd.nist.gov/vuln/detail/CVE-2020-5252 (Accessed: March 5, 2024).
  230. A. War, A. Habib, A. Diallo, J. Klein, and T. F. Bissyandé, “Security vulnerabilities in infrastructure as code: What, how many, and who?” 2023.
  231. Software Vulnerability CVE-2024-38346. https://nvd.nist.gov/vuln/detail/CVE-2024-38346 (Accessed: March 5, 2024).
  232. Software Vulnerability CVE-2022-23635. https://nvd.nist.gov/vuln/detail/CVE-2022-23635 (Accessed: March 5, 2024).
  233. Software Vulnerability CVE-2024-33891. https://nvd.nist.gov/vuln/detail/CVE-2024-33891 (Accessed: March 5, 2024).
  234. Software Vulnerability CVE-2024-41110. https://nvd.nist.gov/vuln/detail/CVE-2024-41110 (Accessed: March 5, 2024).
  235. Software Vulnerability CVE-2024-41129 . https://nvd.nist.gov/vuln/detail/CVE-2024-41129 (Accessed: March 5, 2024).
  236. Software Vulnerability CVE-2023-30617 . https://nvd.nist.gov/vuln/detail/CVE-2023-30617 (Accessed: March 5, 2024).
  237. Software Vulnerability CVE-2024-41122 . https://nvd.nist.gov/vuln/detail/CVE-2024-41122 (Accessed: March 5, 2024).
  238. Software Vulnerability CVE-2018-3831 . https://nvd.nist.gov/vuln/detail/CVE-2018-3831 (Accessed: March 5, 2024).
  239. Software Vulnerability CVE-2021-26084 . https://nvd.nist.gov/vuln/detail/CVE-2021-26084 (Accessed: March 5, 2024).
  240. Software Vulnerability CVE-2024-5687 . https://nvd.nist.gov/vuln/detail/CVE-2024-5687 (Accessed: March 5, 2024).
  241. Software Vulnerability CVE-2021-40539 . https://nvd.nist.gov/vuln/detail/CVE-2021-40539 (Accessed: March 5, 2024).
  242. Software Vulnerability CVE-2024-3234 . https://nvd.nist.gov/vuln/detail/CVE-2024-3234 (Accessed: March 5, 2024).
  243. Software Vulnerability CVE-2021-34523 . https://nvd.nist.gov/vuln/detail/CVE-2021-34523 (Accessed: March 5, 2024).
  244. Software Vulnerability CVE-2003-0550 . https://nvd.nist.gov/vuln/detail/CVE-2003-0550 (Accessed: March 5, 2024).
  245. Software Vulnerability CVE-2018-13379 . https://nvd.nist.gov/vuln/detail/CVE-2018-13379 (Accessed: March 5, 2024).
  246. A. Koskinen, “Devsecops: building security into the core of devops,” Master’s thesis, 2019.
  247. E. Wolff, “microservice,” https://github.com/ewolff/microservice, 2023, accessed: 2023-10-14.
  248. V. Ravuri, “e-commerce-microservices-sample,” https://github.com/venkataravuri/e-commerce-microservices-sample, 2023, accessed: 2023-11-12.
  249. in28minutes, “spring-microservices,” https://github.com/in28minutes/spring-microservices, 2023, accessed: 2023-10-21.
  250. CSC-DevOps, “App,” https://github.com/CSC-DevOps/App, 2023, accessed: 2023-10-25.
Citations (1)

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com