Download Publication
Who it's for:
- Application developers and architects
- System and security administrators
- Security program managers
- Information system security officers
Microservices Architecture Pattern
Release Date: 08/31/2021
Working Group: Application Containers and Microservices
This document provides a repeatable approach to architecting, developing, and deploying microservices as Microservices Architecture Patterns (MAPs). The proposed MAP contains all the information necessary for a microservice to operate independently and communicate with other microservices which, in aggregate, become the components of an application.
This vendor-neutral reference architecture decomposes into software architecture patterns represented in software and platform (enterprise) planes, and then can be built back up with the addition of security control overlays. This can be demonstrated by the successful decomposition and recomposition of microservice architecture patterns where the integral action is the overlay of security controls.
Key Takeaways:
- The difference between architectures and solutions
- What Microservices Architecture Patterns (MAPs) are
- The components of several MAPs: offload, route, aggregation, cache, proxy, authN, authZ, facade, strangler fig, circuit breaker, and adapter patterns
- What security control overlays are
- The components of several overlays: service, IAM, network, monitoring, cryptologic, and microservice availability and resiliency overlays
Download this Resource
Prefer to access this resource without an account? Download it now.
Related Resources
Interested in helping develop research with CSA?
Related Certificates & Training

CSA's Cloud Infrastructure Security training provides a high-level introduction to the most critical cloud security topics through virtual self-paced courses. Each Cloud Infrastructure Security training focuses on a specific area of cloud computing, and is design to be succinct, taking one-hour to complete.
Learn more
Learn more


.jpeg)
.jpeg)
.jpeg)