Secure Containers and Microservices Series
Blog Article Published: 08/18/2021
Last updated: September 1, 2021
CSA Application Containers and Microservices Working Group’s Secure Containers and Microservices Series
Application containers and a microservices architecture, as defined in NIST SP 800-180, are being used to design, develop and deploy applications leveraging agile software development approaches such as Development Operations. Security of application components needs to be considered throughout the software development life cycle (SDLC). NIST 800-160, Systems Security Engineering, defines the need for trustworthy secure systems based on a wide variety of stakeholder needs. Over the past several years, the CSA Application Containers and Microservices Working Group has released a series of documents which outline the best practices for implementing security containers and microservices.
The first document in the series “Challenges in Securing Application Containers and Microservices” presents the challenges Architects, Developers and Operators will encounter when designing, deploying and operating secure application containers and microservices. Two companion documents were released outlining the best practices that should be followed to address the challenges outlined. One document specifically addresses containers (“Best Practices for Implementing a Secure Application Container Architecture”) and the other addresses microservices (“Best Practices in Implementing a Secure Microservices Architecture”). These recommendations and best practices were intended for Developer, Operator and Architect audiences.
The final document in this series (released on August 31, 2021), is a companion document to the aforementioned “Best Practices in Implementing a Secure Microservices Architecture.” Readers of that document were presented with guidance about the engineering of trustworthy secure systems, with the last chapter focused through the lens of the Developer, the Operator and the Architect, while the Microservices Architecture Pattern (MAP) document serves to propose a repeatable approach to architecting, developing and deploying Microservices as a MAP. This paper describes the key elements of the MAP, how they should be designed and deployed, and shifting security and compliance left via a continuous compliance-as-code approach.
Documents in the Series
Publication in the Series |
Release Date |
Challenges in Securing Application Containers and Microservices |
07/16/2019 |
Best Practices for Implementing a Secure Application Container Architecture |
07/26/2019 |
Best Practices in Implementing a Secure Microservices Architecture |
02/24/2020 |
08/31/2021 |
Join the DevSecOps working group to help contribute to future research related to this project.
Trending This Week
#1 Cloud Network Virtualization Benefits of SDN over VLAN
#2 Simple but Effective Tactics to Protect Your Website Against DDoS Attacks in 2021
#3 Understanding the OWASP API Security Top 10
#4 How to Choose a Zero Trust Architecture: SDP or Reverse Proxy
#5 3 Big Amazon S3 Vulnerabilities You May be Missing
Sign up to receive CSA's latest blogs
This list receives 1-2 emails a month.
Related Articles:
5 Things You Need to Look for in CSPM
Published: 09/12/2023
How To Avoid a Security Potluck With Good Governance from Code to Cloud
Published: 09/07/2023