Top Security Threats to Microfrontends and How to Mitigate Them

Top Security Threats to Micro Frontends and How to Mitigate Them

Shielding Your Micro Frontends: Proven Strategies to Combat the Top Security Risks

In web development, frontends refer to the components of applications that allow users to interact directly with them, typically through web pages. Micro frontends, on the other hand, are an architectural pattern in which traditional frontends are broken down into smaller, more manageable components.

👉 Learn how you can take a component-driven approach to developing micro frontends.

Micro frontends are becoming increasingly popular due to their benefits, including enhanced flexibility, scalability, and improved development and deployment processes. However, with increased modularity, new challenges arise, particularly regarding security.

In this article, we will delve into the security challenges that arise in micro frontends and explore various techniques to mitigate them using best practices to ensure the long-term mitigation of these threats.

Security in frontends

Frontends are the first point of contact between an application and its users and are the typical component that exposes the application’s functionality to the Internet. Due to this exposure, it becomes a primary target for any attacker attempting to infiltrate the application. With the number of attacks increasing substantially, frontend security is scrutinized more closely than ever.

These attacks highlight the need for robust security measures in all aspects of web applications, including frontends. It includes ensuring a frontend is secure and implementing various measures, such as input validation, authentication, and authorization controls. Regular testing and monitoring can identify and address vulnerabilities, increasing the application’s security.

How does frontend security affect micro frontends?

Frontend security focuses on securing all aspects of the web application frontends, including micro frontends. The primary significance of using micro frontends for web development ensures that the entire frontend is comprised of small, independent, and loosely coupled components instead of one large frontend.

This approach enhances the development approach but does not eliminate the fact that micro frontends are separate from the actual frontend. Due to this reason, all security threats that affect frontends also affect the underlying micro frontend components. It is crucial to secure these individual components individually so that any vulnerability within these individual components does not affect the overall frontend security.

Some of the most common challenges seen while attempting to secure micro frontends are the ones developers least think about regarding their effects on application security. This article dives into some of the common difficulties prominent in real-world scenarios.

1. Versioning

When implementing micro frontend or microservice security measures, the composition of micro frontends or microservices presents a unique challenge. The challenge revolves around managing versions effectively. If the same version of an app or component is used across multiple micro frontends or microservices, there is a heightened risk of introducing vulnerabilities.

In this scenario, if a new version of the app/component contains a vulnerability, it is propagated across all the micro frontends or microservices that utilize it. Consequently, the attack surface is significantly expanded. Conversely, maintaining multiple versions of the same app/component for various micro frontends or microservices necessitates the ability to identify which micro frontends or microservices are affected by a vulnerability because they consume a specific ‘problematic’ version. Furthermore, it is crucial to promptly deploy a fix to all the affected microservices.

💡 With Bit’s component-compare feature, you can keep track of all the changes your components go through as they are updated. Learn more here.

2. Integration

Regarding micro frontend or microservice security, there is a concern regarding the potential access that they have to each other when residing within the same browser environment. If this access is not managed correctly, it can result in the unauthorized transfer of sensitive information such as cookies, tokens, or other confidential data.

Consider a scenario where your application incorporates a third-party app or component for rendering purposes. If this integration lacks proper isolation or sandboxing mechanisms, the third-party app can gain unauthorized access to information and assets from other application parts. Additionally, the runtime behavior of a micro frontend or microservice is more challenging to control compared to its design and build phases. This lack of control and potential external data dependencies can create vulnerabilities that pave the way for injections or unauthorized data retrieval.

3. Complexity

Micro frontends are commonly implemented alongside Domain-Driven Design (DDD) and Backend-for-Frontend (BFF) strategies in microservice security. In this setup, each micro frontend interacts with various backend microservices. While this modular architecture offers numerous benefits, it also introduces complexities regarding authentication and authorization across multiple endpoints. Challenges may arise in managing shared states and permissions and ensuring secure communication between micro frontends and backend services. Additionally, using different APIs within this ecosystem can lead to excessive data exposure, increasing the risk of unauthorized access or data leakage.

Top security threats to micro frontends

Like any other software architecture, micro frontends are not immune to security threats that attackers can exploit and compromise the web application. Some of the most common vulnerabilities associated with micro frontends include the following:

  1. Cross-site scripting (XSS)
  2. Cross-site request forgery (CSRF)
  3. Insecure data storage
  4. Injection attacks
  5. Broken access control
  6. Malicious components

Cross-site scripting (XSS)

Since micro frontends are typically built using a combination of server-side and client-side code, they can be vulnerable to XSS attacks. Attackers can inject malicious code into the client-side code of one micro frontend, which can then execute in the context of the user’s browser and potentially steal sensitive information.

Cross-site request forgery (CSRF)

Another common vulnerability in micro frontends is CSRF attacks. Attackers can use this technique to trick users into executing unwanted actions on a micro frontend by sending a malicious request from a different domain.

Insecure data storage

Since micro frontends are typically deployed independently, there is a risk of data being stored insecurely in one micro frontend that other micro frontends can access. Attackers can leverage this to access sensitive information stored on the micro frontend.

Injection attacks

Micro frontends can also be vulnerable to injection attacks, such as SQL injection or code injection, where attackers can inject malicious code into the application and execute it in the context of the user’s browser.

Broken access control

With multiple micro frontends working together, ensuring that users are properly authenticated and authorized to access different application parts is essential. If not properly implemented, this can lead to security vulnerabilities, such as unauthorized access to sensitive information.

Malicious components

Since micro frontends involve multiple individual components, malicious components can be introduced into the application. It may be done in several ways, including but not limited to malicious third-party libraries or via a compromised micro frontend codebase.

How to Mitigate Security Threats

Even though there are various threats to micro frontends, developers continue to use this concept due to its growing popularity and numerous benefits. However, once developers understand these threats, applying mitigative controls to reduce the risk is pretty straightforward.

Some of the most popular approaches to securing micro frontends and minimizing the risks include:

  1. Keep all micro frontends up to date
  2. Use Content Security Policy (CSP)
  3. Implement proper authentication and authorization mechanisms
  4. Apply input validation and sanitization techniques
  5. Perform regular security audits and penetration testing

Keep all micro frontends up to date

Keeping all micro frontends up to date is essential in mitigating security threats. Outdated software can contain known security vulnerabilities that attackers can exploit to gain unauthorized access or compromise the integrity of the application.

To keep micro frontends up to date, it is essential to have a regular maintenance schedule that includes updating all dependencies, libraries, and frameworks. This should be done regularly, ideally when new security patches or updates are released.

In addition to keeping software up to date, monitoring for security advisories and acting quickly to address known vulnerabilities is essential. This can include implementing temporary workarounds until a permanent fix can be applied.

It is also essential to ensure that all developers working on the micro frontends know the importance of keeping software up to date and are trained to apply updates properly without introducing new security vulnerabilities. But, some tools can simplify the process of managing dependency versions. For example, suppose you were using a tool such as Bit to build your micro frontends. In that case, you can use the inbuilt CLI command bit install –update-existing to automatically update all the dependencies you’ve used across your application.

Use Content Security Policy (CSP)

Using Content Security Policy (CSP) is an effective way to mitigate security threats in micro frontends. CSP is a security feature that allows web developers to specify which resources, such as scripts, stylesheets, and images, can be loaded by a web page.

By using CSP, it is possible to prevent malicious scripts from being injected into the micro frontend ecosystem. CSP defines a set of policies that restrict the types of content that can be loaded and executed on a web page. These policies can whitelist trusted sources and block unknown or potentially malicious content.

CSP can be implemented in several ways, such as using HTTP headers. Once implemented, CSP can help prevent common security vulnerabilities such as cross-site scripting (XSS), clickjacking, and code injection.

Implement proper authentication and authorization mechanisms

Implementing proper authentication and authorization mechanisms is crucial for mitigating security threats in micro frontends. Micro frontends comprise multiple independent front-end applications that create a cohesive user interface. This architecture can create a complex security environment, making it challenging to ensure that only authorized entities can access the system and perform specific actions.

Within the micro frontend architecture, individual micro frontends may need to communicate with each other. Strong authentication and authorization mechanisms are required in these scenarios to ensure that only authorized entities can access these resources. Inadequate authentication or authorization may lead to an attacker gaining access to these resources.

Since authentication is a standard method that gets reused within the architecture of the services, developers may use the versatility and reusability of Bit components to replicate the same functionality within the application. This allows developers to use the same component across multiple functions and applications, thus eliminating the need to implement multiple instances of the same component in various instances, further improving code maintainability and scalability. For example, if your authorization component was updated, all the places it was used can be updated automatically with Bit, which lets you only update one place and its entire usage tree.

Learn more:

Extracting and Reusing Pre-existing Components using bit add

Apply input validation and sanitization techniques

Applying input validation and sanitization techniques is essential for mitigating security threats in micro frontends. Input validation and sanitization are security measures that help prevent attackers from injecting malicious code or data into the system through user inputs.

Input validation involves checking the user input to ensure it meets the expected format and constraints. For example, suppose a form requires a user to enter an email address. In that case, the input validation process should ensure that the email address is in a valid format, contains an “@” symbol, and is associated with a valid domain. If the input validation process identifies any invalid input, it should return an error message to the user and prevent the submission of the form.

Developments should follow best practices and standards to implement input validation and sanitization techniques. It includes using secure coding techniques to prevent attacks like SQL injection, Cross-Site Scripting (XSS), and Command Injection. To prevent these attacks, developers should also use certain coding practices like parameterized queries, prepared statements, and input sanitization libraries.

Perform regular security audits and penetration testing

Regular security audits and penetration testing are crucial for mitigating security threats in micro frontends. Security audits and penetration testing help identify vulnerabilities and weaknesses in the system that attackers could exploit. Developers can proactively address security concerns and prevent potential security breaches by conducting regular security audits and penetration testing.

A security audit involves reviewing the system’s security controls and policies to identify weaknesses or vulnerabilities. This can include reviewing code for potential security flaws, assessing the effectiveness of access control mechanisms, and evaluating the security of data storage and transmission. A security audit can also help ensure the system complies with relevant security standards and regulations.

Penetration testing involves simulating an attack on the system to identify vulnerabilities and weaknesses. This can involve various techniques, including network scanning, vulnerability scanning, and social engineering. By identifying and exploiting vulnerabilities in the system, penetration testing can help developers understand the potential impact of a real-world attack and take steps to address those vulnerabilities.

Developers should follow best practices and standards to ensure the effectiveness of security audits and penetration testing. This includes using a risk-based approach to identify the system’s most critical assets and components, conducting tests in a controlled environment, and using appropriate tools and techniques to identify and exploit vulnerabilities.

Conclusion

Micro frontends are becoming increasingly popular in web development, but they also introduce new security threats that must be mitigated. We have discussed several top security threats to micro frontends, including malicious components, cross-site scripting, and data leakage. Mitigation techniques, such as keeping micro frontends up to date, using content security policies, implementing proper authentication and authorization mechanisms, and applying input validation and sanitization techniques, are critical for protecting against these threats.

It is essential to emphasize the need for ongoing vigilance in protecting micro frontends against security threats. Developers should stay updated with new security threats and mitigation techniques to ensure their systems remain secure. Conducting regular security audits and penetration testing and following best practices and standards for web security can help identify vulnerabilities and weaknesses in the design and proactively address them.

While micro frontends offer many benefits in web development but also present new security challenges, mitigating these security threats by implementing proper security measures and staying up to date with the latest security threats and mitigation techniques is crucial. By doing so, developers can help ensure the micro frontend ecosystem remains secure and protected against potential security breaches.

Build Apps with reusable components, just like Lego

Bit’s open-source tool help 250,000+ devs to build apps with components.

Turn any UI, feature, or page into a reusable component — and share it across your applications. It’s easier to collaborate and build faster.

Learn more

Split apps into components to make app development easier, and enjoy the best experience for the workflows you want:

Micro-Frontends

Design System

Code-Sharing and reuse

Monorepo

Learn more:


Top Security Threats to Microfrontends and How to Mitigate Them was originally published in Bits and Pieces on Medium, where people are continuing the conversation by highlighting and responding to this story.


This content originally appeared on Bits and Pieces - Medium and was authored by Lahiru Hewawasam

Top Security Threats to Micro Frontends and How to Mitigate Them

Shielding Your Micro Frontends: Proven Strategies to Combat the Top Security Risks

In web development, frontends refer to the components of applications that allow users to interact directly with them, typically through web pages. Micro frontends, on the other hand, are an architectural pattern in which traditional frontends are broken down into smaller, more manageable components.

👉 Learn how you can take a component-driven approach to developing micro frontends.

Micro frontends are becoming increasingly popular due to their benefits, including enhanced flexibility, scalability, and improved development and deployment processes. However, with increased modularity, new challenges arise, particularly regarding security.

In this article, we will delve into the security challenges that arise in micro frontends and explore various techniques to mitigate them using best practices to ensure the long-term mitigation of these threats.

Security in frontends

Frontends are the first point of contact between an application and its users and are the typical component that exposes the application’s functionality to the Internet. Due to this exposure, it becomes a primary target for any attacker attempting to infiltrate the application. With the number of attacks increasing substantially, frontend security is scrutinized more closely than ever.

These attacks highlight the need for robust security measures in all aspects of web applications, including frontends. It includes ensuring a frontend is secure and implementing various measures, such as input validation, authentication, and authorization controls. Regular testing and monitoring can identify and address vulnerabilities, increasing the application’s security.

How does frontend security affect micro frontends?

Frontend security focuses on securing all aspects of the web application frontends, including micro frontends. The primary significance of using micro frontends for web development ensures that the entire frontend is comprised of small, independent, and loosely coupled components instead of one large frontend.

This approach enhances the development approach but does not eliminate the fact that micro frontends are separate from the actual frontend. Due to this reason, all security threats that affect frontends also affect the underlying micro frontend components. It is crucial to secure these individual components individually so that any vulnerability within these individual components does not affect the overall frontend security.

Some of the most common challenges seen while attempting to secure micro frontends are the ones developers least think about regarding their effects on application security. This article dives into some of the common difficulties prominent in real-world scenarios.

1. Versioning

When implementing micro frontend or microservice security measures, the composition of micro frontends or microservices presents a unique challenge. The challenge revolves around managing versions effectively. If the same version of an app or component is used across multiple micro frontends or microservices, there is a heightened risk of introducing vulnerabilities.

In this scenario, if a new version of the app/component contains a vulnerability, it is propagated across all the micro frontends or microservices that utilize it. Consequently, the attack surface is significantly expanded. Conversely, maintaining multiple versions of the same app/component for various micro frontends or microservices necessitates the ability to identify which micro frontends or microservices are affected by a vulnerability because they consume a specific ‘problematic’ version. Furthermore, it is crucial to promptly deploy a fix to all the affected microservices.

💡 With Bit’s component-compare feature, you can keep track of all the changes your components go through as they are updated. Learn more here.

2. Integration

Regarding micro frontend or microservice security, there is a concern regarding the potential access that they have to each other when residing within the same browser environment. If this access is not managed correctly, it can result in the unauthorized transfer of sensitive information such as cookies, tokens, or other confidential data.

Consider a scenario where your application incorporates a third-party app or component for rendering purposes. If this integration lacks proper isolation or sandboxing mechanisms, the third-party app can gain unauthorized access to information and assets from other application parts. Additionally, the runtime behavior of a micro frontend or microservice is more challenging to control compared to its design and build phases. This lack of control and potential external data dependencies can create vulnerabilities that pave the way for injections or unauthorized data retrieval.

3. Complexity

Micro frontends are commonly implemented alongside Domain-Driven Design (DDD) and Backend-for-Frontend (BFF) strategies in microservice security. In this setup, each micro frontend interacts with various backend microservices. While this modular architecture offers numerous benefits, it also introduces complexities regarding authentication and authorization across multiple endpoints. Challenges may arise in managing shared states and permissions and ensuring secure communication between micro frontends and backend services. Additionally, using different APIs within this ecosystem can lead to excessive data exposure, increasing the risk of unauthorized access or data leakage.

Top security threats to micro frontends

Like any other software architecture, micro frontends are not immune to security threats that attackers can exploit and compromise the web application. Some of the most common vulnerabilities associated with micro frontends include the following:

  1. Cross-site scripting (XSS)
  2. Cross-site request forgery (CSRF)
  3. Insecure data storage
  4. Injection attacks
  5. Broken access control
  6. Malicious components

Cross-site scripting (XSS)

Since micro frontends are typically built using a combination of server-side and client-side code, they can be vulnerable to XSS attacks. Attackers can inject malicious code into the client-side code of one micro frontend, which can then execute in the context of the user’s browser and potentially steal sensitive information.

Cross-site request forgery (CSRF)

Another common vulnerability in micro frontends is CSRF attacks. Attackers can use this technique to trick users into executing unwanted actions on a micro frontend by sending a malicious request from a different domain.

Insecure data storage

Since micro frontends are typically deployed independently, there is a risk of data being stored insecurely in one micro frontend that other micro frontends can access. Attackers can leverage this to access sensitive information stored on the micro frontend.

Injection attacks

Micro frontends can also be vulnerable to injection attacks, such as SQL injection or code injection, where attackers can inject malicious code into the application and execute it in the context of the user’s browser.

Broken access control

With multiple micro frontends working together, ensuring that users are properly authenticated and authorized to access different application parts is essential. If not properly implemented, this can lead to security vulnerabilities, such as unauthorized access to sensitive information.

Malicious components

Since micro frontends involve multiple individual components, malicious components can be introduced into the application. It may be done in several ways, including but not limited to malicious third-party libraries or via a compromised micro frontend codebase.

How to Mitigate Security Threats

Even though there are various threats to micro frontends, developers continue to use this concept due to its growing popularity and numerous benefits. However, once developers understand these threats, applying mitigative controls to reduce the risk is pretty straightforward.

Some of the most popular approaches to securing micro frontends and minimizing the risks include:

  1. Keep all micro frontends up to date
  2. Use Content Security Policy (CSP)
  3. Implement proper authentication and authorization mechanisms
  4. Apply input validation and sanitization techniques
  5. Perform regular security audits and penetration testing

Keep all micro frontends up to date

Keeping all micro frontends up to date is essential in mitigating security threats. Outdated software can contain known security vulnerabilities that attackers can exploit to gain unauthorized access or compromise the integrity of the application.

To keep micro frontends up to date, it is essential to have a regular maintenance schedule that includes updating all dependencies, libraries, and frameworks. This should be done regularly, ideally when new security patches or updates are released.

In addition to keeping software up to date, monitoring for security advisories and acting quickly to address known vulnerabilities is essential. This can include implementing temporary workarounds until a permanent fix can be applied.

It is also essential to ensure that all developers working on the micro frontends know the importance of keeping software up to date and are trained to apply updates properly without introducing new security vulnerabilities. But, some tools can simplify the process of managing dependency versions. For example, suppose you were using a tool such as Bit to build your micro frontends. In that case, you can use the inbuilt CLI command bit install --update-existing to automatically update all the dependencies you've used across your application.

Use Content Security Policy (CSP)

Using Content Security Policy (CSP) is an effective way to mitigate security threats in micro frontends. CSP is a security feature that allows web developers to specify which resources, such as scripts, stylesheets, and images, can be loaded by a web page.

By using CSP, it is possible to prevent malicious scripts from being injected into the micro frontend ecosystem. CSP defines a set of policies that restrict the types of content that can be loaded and executed on a web page. These policies can whitelist trusted sources and block unknown or potentially malicious content.

CSP can be implemented in several ways, such as using HTTP headers. Once implemented, CSP can help prevent common security vulnerabilities such as cross-site scripting (XSS), clickjacking, and code injection.

Implement proper authentication and authorization mechanisms

Implementing proper authentication and authorization mechanisms is crucial for mitigating security threats in micro frontends. Micro frontends comprise multiple independent front-end applications that create a cohesive user interface. This architecture can create a complex security environment, making it challenging to ensure that only authorized entities can access the system and perform specific actions.

Within the micro frontend architecture, individual micro frontends may need to communicate with each other. Strong authentication and authorization mechanisms are required in these scenarios to ensure that only authorized entities can access these resources. Inadequate authentication or authorization may lead to an attacker gaining access to these resources.

Since authentication is a standard method that gets reused within the architecture of the services, developers may use the versatility and reusability of Bit components to replicate the same functionality within the application. This allows developers to use the same component across multiple functions and applications, thus eliminating the need to implement multiple instances of the same component in various instances, further improving code maintainability and scalability. For example, if your authorization component was updated, all the places it was used can be updated automatically with Bit, which lets you only update one place and its entire usage tree.

Learn more:

Extracting and Reusing Pre-existing Components using bit add

Apply input validation and sanitization techniques

Applying input validation and sanitization techniques is essential for mitigating security threats in micro frontends. Input validation and sanitization are security measures that help prevent attackers from injecting malicious code or data into the system through user inputs.

Input validation involves checking the user input to ensure it meets the expected format and constraints. For example, suppose a form requires a user to enter an email address. In that case, the input validation process should ensure that the email address is in a valid format, contains an “@” symbol, and is associated with a valid domain. If the input validation process identifies any invalid input, it should return an error message to the user and prevent the submission of the form.

Developments should follow best practices and standards to implement input validation and sanitization techniques. It includes using secure coding techniques to prevent attacks like SQL injection, Cross-Site Scripting (XSS), and Command Injection. To prevent these attacks, developers should also use certain coding practices like parameterized queries, prepared statements, and input sanitization libraries.

Perform regular security audits and penetration testing

Regular security audits and penetration testing are crucial for mitigating security threats in micro frontends. Security audits and penetration testing help identify vulnerabilities and weaknesses in the system that attackers could exploit. Developers can proactively address security concerns and prevent potential security breaches by conducting regular security audits and penetration testing.

A security audit involves reviewing the system’s security controls and policies to identify weaknesses or vulnerabilities. This can include reviewing code for potential security flaws, assessing the effectiveness of access control mechanisms, and evaluating the security of data storage and transmission. A security audit can also help ensure the system complies with relevant security standards and regulations.

Penetration testing involves simulating an attack on the system to identify vulnerabilities and weaknesses. This can involve various techniques, including network scanning, vulnerability scanning, and social engineering. By identifying and exploiting vulnerabilities in the system, penetration testing can help developers understand the potential impact of a real-world attack and take steps to address those vulnerabilities.

Developers should follow best practices and standards to ensure the effectiveness of security audits and penetration testing. This includes using a risk-based approach to identify the system’s most critical assets and components, conducting tests in a controlled environment, and using appropriate tools and techniques to identify and exploit vulnerabilities.

Conclusion

Micro frontends are becoming increasingly popular in web development, but they also introduce new security threats that must be mitigated. We have discussed several top security threats to micro frontends, including malicious components, cross-site scripting, and data leakage. Mitigation techniques, such as keeping micro frontends up to date, using content security policies, implementing proper authentication and authorization mechanisms, and applying input validation and sanitization techniques, are critical for protecting against these threats.

It is essential to emphasize the need for ongoing vigilance in protecting micro frontends against security threats. Developers should stay updated with new security threats and mitigation techniques to ensure their systems remain secure. Conducting regular security audits and penetration testing and following best practices and standards for web security can help identify vulnerabilities and weaknesses in the design and proactively address them.

While micro frontends offer many benefits in web development but also present new security challenges, mitigating these security threats by implementing proper security measures and staying up to date with the latest security threats and mitigation techniques is crucial. By doing so, developers can help ensure the micro frontend ecosystem remains secure and protected against potential security breaches.

Build Apps with reusable components, just like Lego

Bit’s open-source tool help 250,000+ devs to build apps with components.

Turn any UI, feature, or page into a reusable component — and share it across your applications. It’s easier to collaborate and build faster.

Learn more

Split apps into components to make app development easier, and enjoy the best experience for the workflows you want:

Micro-Frontends

Design System

Code-Sharing and reuse

Monorepo

Learn more:


Top Security Threats to Microfrontends and How to Mitigate Them was originally published in Bits and Pieces on Medium, where people are continuing the conversation by highlighting and responding to this story.


This content originally appeared on Bits and Pieces - Medium and was authored by Lahiru Hewawasam


Print Share Comment Cite Upload Translate Updates
APA

Lahiru Hewawasam | Sciencx (2023-06-05T06:01:33+00:00) Top Security Threats to Microfrontends and How to Mitigate Them. Retrieved from https://www.scien.cx/2023/06/05/top-security-threats-to-microfrontends-and-how-to-mitigate-them/

MLA
" » Top Security Threats to Microfrontends and How to Mitigate Them." Lahiru Hewawasam | Sciencx - Monday June 5, 2023, https://www.scien.cx/2023/06/05/top-security-threats-to-microfrontends-and-how-to-mitigate-them/
HARVARD
Lahiru Hewawasam | Sciencx Monday June 5, 2023 » Top Security Threats to Microfrontends and How to Mitigate Them., viewed ,<https://www.scien.cx/2023/06/05/top-security-threats-to-microfrontends-and-how-to-mitigate-them/>
VANCOUVER
Lahiru Hewawasam | Sciencx - » Top Security Threats to Microfrontends and How to Mitigate Them. [Internet]. [Accessed ]. Available from: https://www.scien.cx/2023/06/05/top-security-threats-to-microfrontends-and-how-to-mitigate-them/
CHICAGO
" » Top Security Threats to Microfrontends and How to Mitigate Them." Lahiru Hewawasam | Sciencx - Accessed . https://www.scien.cx/2023/06/05/top-security-threats-to-microfrontends-and-how-to-mitigate-them/
IEEE
" » Top Security Threats to Microfrontends and How to Mitigate Them." Lahiru Hewawasam | Sciencx [Online]. Available: https://www.scien.cx/2023/06/05/top-security-threats-to-microfrontends-and-how-to-mitigate-them/. [Accessed: ]
rf:citation
» Top Security Threats to Microfrontends and How to Mitigate Them | Lahiru Hewawasam | Sciencx | https://www.scien.cx/2023/06/05/top-security-threats-to-microfrontends-and-how-to-mitigate-them/ |

Please log in to upload a file.




There are no updates yet.
Click the Upload button above to add an update.

You must be logged in to translate posts. Please log in or register.