Many organizations today have a basic understanding of the security risks associated with their web applications. However, many will find that their efforts to just add on security to existing applications fall short of being effective. Each new development in the software design process can bring an abundance of benefits to an organization, but it also brings along several new security challenges.
Distributed microservices architecture has made quite an impact as far as modern application development trends go. With the design of an application being broken apart into smaller pieces and building it as a set of modular components, it makes it easier to build and maintain than traditional, monolithic applications developed as a single entity. Plus, unlike monolithic applications, individual components can be inserted effortlessly into continuous delivery pipelines helping developers meet their strict deadlines.
While microservices have provided many benefits to development teams, they present some real challenges. Utilizing microservices adds a lot of moving pieces to an application which increases the potential for issues such as security vulnerabilities.
Microservices create more insecurities on average than traditional applications - and not just by a little bit. For every 100,000 lines of code, a monolithic application has an average of 39 vulnerabilities. Microservice applications have an average of 180, which means the transition to microservices architecture has led to increase of total vulnerabilities for organizations.
However, despite a plethora of vulnerabilities, applications built on microservices have a higher remediation rate. Another plus to this architecture, is the time to fix the vulnerabilities is 50 percent lower than in traditional, monolithic apps. The reason for this is one breach in a monolithic application can infect the application as a whole. In a microservices application vulnerabilities can be cut off in different parts, containing the infection to one specific part.
Overall, microservices present a tricky situation for organizations. Despite vulnerabilities having a higher remediation rate, their use of third-party unpatched libraries complicates security protocols and increases risks. Before development and security teams decide to utilize microservices they need to weigh the risks and benefits and always remember to utilize security best practices to combat these issues.
About the Author: Craig Hinkley joined WhiteHat Security as CEO in early 2015, bringing more than 20 years of executive leadership in the technology sector to this role. Craig is driving a customer-centric focus throughout the company and has broadened WhiteHat’s global brand and visibility beyond the application security space and security buyer, to the world of the development organization and a DevSecOps approach to application development.
Antivirus software is not enough. Apex Technology Services used its decades of IT and cybersecurity
experience to create budget-friendly network security packages every company needs.
Please take a moment to fill out your information so we can contact you directly regarding your request.
How can sellers protect their sales funnels if their Amazon product supply is at risk of running out?
SSL is what facilitates secure internet as it protects sensitive user data. Regardless of whether or not a website handles sensitive data like credit …
Designers having prototypes made for their clients to view and hold has become a normal part of the designing process. Physical models are much easier…
5G service is slowly being rolled out. Soon, it won't just be the major cities that have access to super-fast 5G network, which is reportedly 20 times…
A consortium led by Symphony Technology Group (STG), an American private equity firm based in Palo Alto, California, the Ontario Teachers' Pension Pla…