Secure Containers and Microservices Series
Blog Article Published: 08/18/2021
Last updated: September 1, 2021
CSA Application Containers and Microservices Working Group’s Secure Containers and Microservices Series
Application containers and a microservices architecture, as defined in NIST SP 800-180, are being used to design, develop and deploy applications leveraging agile software development approaches such as Development Operations. Security of application components needs to be considered throughout the software development life cycle (SDLC). NIST 800-160, Systems Security Engineering, defines the need for trustworthy secure systems based on a wide variety of stakeholder needs. Over the past several years, the CSA Application Containers and Microservices Working Group has released a series of documents which outline the best practices for implementing security containers and microservices.
The first document in the series “Challenges in Securing Application Containers and Microservices” presents the challenges Architects, Developers and Operators will encounter when designing, deploying and operating secure application containers and microservices. Two companion documents were released outlining the best practices that should be followed to address the challenges outlined. One document specifically addresses containers (“Best Practices for Implementing a Secure Application Container Architecture”) and the other addresses microservices (“Best Practices in Implementing a Secure Microservices Architecture”). These recommendations and best practices were intended for Developer, Operator and Architect audiences.
The final document in this series (released on August 31, 2021), is a companion document to the aforementioned “Best Practices in Implementing a Secure Microservices Architecture.” Readers of that document were presented with guidance about the engineering of trustworthy secure systems, with the last chapter focused through the lens of the Developer, the Operator and the Architect, while the Microservices Architecture Pattern (MAP) document serves to propose a repeatable approach to architecting, developing and deploying Microservices as a MAP. This paper describes the key elements of the MAP, how they should be designed and deployed, and shifting security and compliance left via a continuous compliance-as-code approach.
Documents in the Series
Publication in the Series |
Release Date |
Challenges in Securing Application Containers and Microservices |
07/16/2019 |
Best Practices for Implementing a Secure Application Container Architecture |
07/26/2019 |
Best Practices in Implementing a Secure Microservices Architecture |
02/24/2020 |
08/31/2021 |
Join the DevSecOps working group to help contribute to future research related to this project.
Trending This Week
#1 What You Need to Know About the Diaxin Team Ransomware Group
#2 How ChatGPT Can Be Used in Cybersecurity
#3 Mitigating Security Risks in Retrieval Augmented Generation (RAG) LLM Applications
#4 The 6 Phases of Data Security
#5 Roadmap to Earning Your Certificate in Cloud Security Knowledge (CCSK)
Sign up to receive CSA's latest blogs
This list receives 1-2 emails a month.
Related Articles:
You’ve Tackled Shadow IT - Now It’s Time to Tackle Shadow DevOps
Published: 11/21/2023
Embracing a Cloud-Native Mindset
Published: 11/06/2023
Shift Left is Only Part of Secure Software Delivery in Financial Services
Published: 11/01/2023