Dissecting the Risks and Benefits of Microservice Architecture

By

Many organizations today have a basic understanding of the security risks associated with their web applications. However, many will find that their efforts to just add on security to existing applications fall short of being effective. Each new development in the software design process can bring an abundance of benefits to an organization, but it also brings along several new security challenges.

Distributed microservices architecture has made quite an impact as far as modern application development trends go. With the design of an application being broken apart into smaller pieces and building it as a set of modular components, it makes it easier to build and maintain than traditional, monolithic applications developed as a single entity. Plus, unlike monolithic applications, individual components can be inserted effortlessly into continuous delivery pipelines helping developers meet their strict deadlines.

While microservices have provided many benefits to development teams, they present some real challenges. Utilizing microservices adds a lot of moving pieces to an application which increases the potential for issues such as security vulnerabilities.

Microservices create more insecurities on average than traditional applications - and not just by a little bit. For every 100,000 lines of code, a monolithic application has an average of 39 vulnerabilities. Microservice applications have an average of 180, which means the transition to microservices architecture has led to increase of total vulnerabilities for organizations.

However, despite a plethora of vulnerabilities, applications built on microservices have a higher remediation rate. Another plus to this architecture, is the time to fix the vulnerabilities is 50 percent lower than in traditional, monolithic apps. The reason for this is one breach in a monolithic application can infect the application as a whole. In a microservices application vulnerabilities can be cut off in different parts, containing the infection to one specific part.

Overall, microservices present a tricky situation for organizations. Despite vulnerabilities having a higher remediation rate, their use of third-party unpatched libraries complicates security protocols and increases risks. Before development and security teams decide to utilize microservices they need to weigh the risks and benefits and always remember to utilize security best practices to combat these issues.  

About the Author: Craig Hinkley joined WhiteHat Security as CEO in early 2015, bringing more than 20 years of executive leadership in the technology sector to this role. Craig is driving a customer-centric focus throughout the company and has broadened WhiteHat’s global brand and visibility beyond the application security space and security buyer, to the world of the development organization and a DevSecOps approach to application development. 




Edited by Maurice Nagle


SHARE THIS ARTICLE
Related Articles

How Social Media Technology Has Changed the Face of Marketing for Small Businesses

By: Special Guest    11/21/2019

All small businesses face tough challenges, particularly when it comes to raising their profile and competing with larger rivals. As a small business …

Read More

The popularity of playing casino on mobile devices

By: Special Guest    11/21/2019

Mobile phones have brought the internet directly to a multitude of people. The demand for mobile casinos has vastly increased because of its convenien…

Read More

5 Tips For Creating A Tech Resume

By: Special Guest    11/20/2019

A tech resume is a list of skills, experience, and employment history that features a person's capacity to prevail in a technical position. When creat…

Read More

Torrent users should consider getting themselves a good VPN

By: Special Guest    11/13/2019

Do you consider your privacy to be of great importance? Then protecting your IP address with a VPN is a wise move, especially when you are downloading…

Read More

Goodbye bloat: How and why the WAN is shifting to the cloud

By: Special Guest    11/12/2019

The cloud-based model is taking over seemingly everything these days. Everything from firewalls to deter hackers to malware that helps them is offered…

Read More