ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Download Publication

Microservices Architecture Pattern
Microservices Architecture Pattern
Who it's for:
  • Application developers and architects
  • System and security administrators
  • Security program managers
  • Information system security officers

Microservices Architecture Pattern

Release Date: 08/31/2021

This document provides a repeatable approach to architecting, developing, and deploying microservices as Microservices Architecture Patterns (MAPs). The proposed MAP contains all the information necessary for a microservice to operate independently and communicate with other microservices which, in aggregate, become the components of an application.

This vendor-neutral reference architecture decomposes into software architecture patterns represented in software and platform (enterprise) planes, and then can be built back up with the addition of security control overlays. This can be demonstrated by the successful decomposition and recomposition of microservice architecture patterns where the integral action is the overlay of security controls. 

Key Takeaways:
  • The difference between architectures and solutions
  • What Microservices Architecture Patterns (MAPs) are
  • The components of several MAPs: offload, route, aggregation, cache, proxy, authN, authZ, facade, strangler fig, circuit breaker, and adapter patterns
  • What security control overlays are
  • The components of several overlays: service, IAM, network, monitoring, cryptologic, and microservice availability and resiliency overlays
 
This publication is part of a larger series, you can find all the papers in the series here.  

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Managing Privileged Access in a Cloud-First World
Managing Privileged Access in a Cloud-First World
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Achieving Resilience Through Zero Trust
Achieving Resilience Through Zero Trust
Published: 08/29/2025
The Emerging Identity Imperatives of Agentic AI
The Emerging Identity Imperatives of Agentic AI
Published: 08/28/2025
Risk-Based vs. Compliance-Based Security: Why One Size Doesn’t Fit All
Risk-Based vs. Compliance-Based Security: Why One Size Doesn’t Fit All
Published: 08/27/2025
"Set It and Forget It” Access Control is No Longer Enough
"Set It and Forget It” Access Control is No Longer Enough
Published: 08/20/2025

Interested in helping develop research with CSA?

Related Certificates & Training