Abstract
With the proliferation of microservices architectures and the adoption of multi-cloud environments, ensuring robust security measures becomes paramount. This paper delves into the significance of security vulnerability detection and monitoring within microservices deployed across multiple cloud platforms. It specifically explores the utilization of Sysdig, a comprehensive container security platform, to enhance security posture in such complex environments. Through an analysis of challenges, best practices, and real-world implementations, this research aims to provide insights into effective strategies for safeguarding microservices in multi-cloud setups.
This paper delves into the critical importance of security vulnerability detection and monitoring within microservices architectures deployed across multiple cloud platforms. Specifically, it investigates the utilization of Sysdig, an advanced container security platform, as a pivotal tool in enhancing security postures in these intricate and dynamic environments. Through an in-depth analysis of the prevailing challenges, exploration of best practices, and examination of real-world implementations, this research aims to offer valuable insights into effective strategies for safeguarding microservices within the complexities of multi-cloud ecosystems. By scrutinizing the role of Sysdig in mitigating security vulnerabilities and bolstering monitoring capabilities, this paper endeavors to provide actionable recommendations for organizations seeking to fortify their security infrastructure amidst the ever-evolving landscape of cloud-native technologies.
Keywords: Microservices; Container; Multi Cloud; Sysdig; Microservices Security; Kubernetes; Pods; Micro-services
References
- Patil SRK., et al. “Hardening Containers with Static and Dynamic Analysis”. In: Onwubiko, C., et al. Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media. Springer Proceedings in Complexity. Springer, Singapore (2023).
- Gantikow Holger., et al. Rule-based Security Monitoring of Containerized Workloads (2019): 543-550.
- C Kolassa, D Riehle and M Salim. “A Model of the Commit Size Distribution of Open Source”. Proc. the 39th Int’l Conf. Current Trends in Theory and Practice of Comput. Sci. (SOFSEM’13), Czech Republic (2013): 52-66.
- L Hattori and M Lanza. “On the nature of commits”. Proc. the 4th Int’l ERCIM Wksp. Softw. Evol. and Evolvability (EVOL’08), Italy (2008): 63-71.
- A Singh., et al. “Event Driven Architecture for Message Streaming data driven Microservices systems residing in distributed version control system”. 3rd IEEE International Conference on Innovation in Science & Technology for Sustainable Development (ICISTSD-2022), College of Engineering, Purumon, Kerala (2022).
- P Hofmann and D Riehle. “Estimating Commit Sizes Efficiently”. Proc. the 5th IFIP WG 2.13 Int’l Conf. Open Source Systems (OSS’09), Sweden (2009): 105-115.
- Kolassa C, Riehle D and Salim M. “A Model of the Commit Size Distribution of Open Source”. Proceedings of the 39th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM’13), Springer-Verlag, Heidelberg, Baden-Württemberg (2013): 5266.
- Arafat O and Riehle D. “The Commit Size Distribution of Open Source Software”. Proceedings of the 42nd Hawaii International Conference on Systems Science (HICSS’09),” IEEE Computer Society Press, New York, NY (2009): 1-8.
- R Purushothaman and DE Perry. “Toward Understanding the Rhetoric of Small Source Code Changes”. IEEE Transactions on Software Engineering 31.6 (2005): 511-526.
- A Singh., et al. “Improving Business deliveries using Continuous Integration and Continuous Delivery using Jenkins and an Advanced Version control system for Microservices-based system”. 2022 5th International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT), Aligarh, India (2022): 1-4.
- A Alali, H Kagdi and J Maletic. “What’s a Typical Commit? A Characterization of Open Source Software Repositories”. Proc. the 16th IEEE Int’l Conf. Program Comprehension (ICPC’08), Netherlands (2008): 182-191.
- A Hindle, D Germán and R Holt. “What do large commits tell us?: a taxonomical study of large commits”. Proc. the 5th Int’l Working Conf. Mining Softw. Repos. (MSR’08), Germany (2008): 99-108.
- V Singh., et al. “A holistic, proactive and novel approach for pre, during and post migration validation from subversion to git”. Computers, Materials & Continua 66.3 (2021): 2359-2371.
- A Singh and A Aggarwal. “Leveraging Advanced Machine Learning Strategies for Optimized Timing of DevOps & Microservices Deployment: A Pragmatic Approach to Predictive Modeling”. Machine Intelligence Research 18.1 (2024).
- Singh A and Aggarwal A. “Predictive Modeling and Machine Learning Techniques for Bottleneck Identification and Optimization in Version Control and CI/CD”. International Journal of Applied Engineering & Technology 6.1 (2024): 1769-1775.
- Ma Y, Wu Y and Xu Y. “Dynamics of Open-Source Software Developer’s Commit Behavior: An Empirical Investigation of Subversion”. Proceedings of the 29th Annual ACM Symposium on Applied Computing (SAC’14) (2014): 1171-1173.
- K German and O Ponomareva. “An Overview of Container Security in a Kubernetes Cluster”. 2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT), Yekaterinburg, Russian Federation (2023): 283-285.
- A Singh., et al. “Identification of the deployment defects in Micro-service hosted in advanced VCS and deployed on containerized cloud environment”. Int. Conference on Intelligence Systems ICIS-2022, Article No. 28, Uttaranchal University, Dehradun.
- E Jimenez-Ruiz., et al. “Contentcvs: A cvs-based collaborative ontology engineering tool”. SWAT4LS. Citeseer (2009).
- I Zaikin and A Tuzovsky. “Owl2vcs: Tools for distributed ontology development”. OWLED. Citeseer (2013).