ChaptersEventsBlog
How is your organization adopting AI technologies? Take this short survey to help us identify key trends and risks across FSI →

Microservices Architecture Pattern

Released: 08/31/2021

Microservices Architecture Pattern
Microservices Architecture Pattern
This document provides a repeatable approach to architecting, developing, and deploying microservices as Microservices Architecture Patterns (MAPs). The proposed MAP contains all the information necessary for a microservice to operate independently and communicate with other microservices which, in aggregate, become the components of an application.

This vendor-neutral reference architecture decomposes into software architecture patterns represented in software and platform (enterprise) planes, and then can be built back up with the addition of security control overlays. This can be demonstrated by the successful decomposition and recomposition of microservice architecture patterns where the integral action is the overlay of security controls. 

Key Takeaways:
  • The difference between architectures and solutions
  • What Microservices Architecture Patterns (MAPs) are
  • The components of several MAPs: offload, route, aggregation, cache, proxy, authN, authZ, facade, strangler fig, circuit breaker, and adapter patterns
  • What security control overlays are
  • The components of several overlays: service, IAM, network, monitoring, cryptologic, and microservice availability and resiliency overlays
 
This publication is part of a larger series, you can find all the papers in the series here.  


Prefer to access this resource without an account? Download it now.


Best For IconBest For:
  • Application developers and architects
  • System and security administrators
  • Security program managers
  • Information system security officers

Partner Event Spotlight

Want to see your content featured here?

Contact us to learn more!

Explore More of CSA

Research & Best Practices

Stay informed about the latest best practices, reports, and solutions in cloud security with CSA research.

Upcoming Events & Conferences

Stay connected with the cloud security community by attending local events, workshops, and global CSA conferences. Engage with industry leaders, gain new insights, and build valuable professional relationships—both virtually and in person.

Training & Certificates

Join the countless professionals who have selected CSA for their training and certification needs.

Industry News

Stay informed with the latest in cloud security news - visit our blog to keep your competitive edge sharp.