Title | Toward Enabling Self-Protection in the Service Mesh of the Microservice Architecture |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Alboqmi, Rami, Jahan, Sharmin, Gamble, Rose F. |
Conference Name | 2022 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C) |
Date Published | sep |
Keywords | assessment, Autonomic Security, composability, Computational modeling, Computer architecture, distributed computing, Microservice architectures, microservices, Observability, pubcrawl, resilience, Resiliency, Runtime, security, Self-protection, Service Mesh, threat model |
Abstract | The service mesh is a dedicated infrastructure layer in a microservice architecture. It manages service-to-service communication within an application between decoupled or loosely coupled microservices (called services) without modifying their implementations. The service mesh includes APIs for security, traffic and policy management, and observability features. These features are enabled using a pre-defined configuration, which can be changed at runtime with human intervention. However, it has no autonomy to self-manage changes to the microservice application's operational environment. A better configuration is one that can be customized according to environmental conditions during execution to protect the application from potential threats. This customization requires enabling self-protection mechanisms within the service mesh that evaluate the risk of environmental condition changes and enable appropriate configurations to defend the application from impending threats. In this paper, we design an assessment component into a service mesh that includes a security assurance case to define the threat model and dynamically assess the application given environment changes. We experiment with a demo application, Bookinfo, using an open-source service mesh platform, Istio, to enable self-protection. We consider certain parameters extracted from the service request as environmental conditions. We evaluate those parameters against the threat model and determine the risk of violating a security requirement for controlled and authorized information flow. |
DOI | 10.1109/ACSOSC56246.2022.00047 |
Citation Key | alboqmi_toward_2022 |