Research Article

Strengthening gRPC Security in Microservices: A Proxy-Based Approach for mTLS, JWT, and RBAC Enforcement

by  Gogulakrishnan Thiyagarajan, Vinay Bist, Prabhudarshi Nayak
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Issue 28
Published: August 2025
Authors: Gogulakrishnan Thiyagarajan, Vinay Bist, Prabhudarshi Nayak
10.5120/ijca2025925359
PDF

Gogulakrishnan Thiyagarajan, Vinay Bist, Prabhudarshi Nayak . Strengthening gRPC Security in Microservices: A Proxy-Based Approach for mTLS, JWT, and RBAC Enforcement. International Journal of Computer Applications. 187, 28 (August 2025), 1-17. DOI=10.5120/ijca2025925359

                        @article{ 10.5120/ijca2025925359,
                        author  = { Gogulakrishnan Thiyagarajan,Vinay Bist,Prabhudarshi Nayak },
                        title   = { Strengthening gRPC Security in Microservices: A Proxy-Based Approach for mTLS, JWT, and RBAC Enforcement },
                        journal = { International Journal of Computer Applications },
                        year    = { 2025 },
                        volume  = { 187 },
                        number  = { 28 },
                        pages   = { 1-17 },
                        doi     = { 10.5120/ijca2025925359 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2025
                        %A Gogulakrishnan Thiyagarajan
                        %A Vinay Bist
                        %A Prabhudarshi Nayak
                        %T Strengthening gRPC Security in Microservices: A Proxy-Based Approach for mTLS, JWT, and RBAC Enforcement%T 
                        %J International Journal of Computer Applications
                        %V 187
                        %N 28
                        %P 1-17
                        %R 10.5120/ijca2025925359
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

As microservices architecture gains mainstream acceptance, security for inter-service communication has become a top priority. gRPC, a widely used high-performance remote procedure call (RPC) framework, enables efficient communication but lacks inherent strong security capabilities, exposing microservices to unauthorized access, data interception, and authentication misconfiguration. To mitigate these challenges, this paper suggests deploying a gRPC Security Proxy that combines mutual TLS (mTLS), JSON Web Token (JWT) authentication, and Role-Based Access Control (RBAC). This combination aims to provide end-to-end encryption, strong identity verification, and fine-grained access control. In contrast to service meshes like Istio and Envoy, which add operational overhead and necessitate massive configuration amounts, the proposed proxy offers a lightweight and easily integrable alternative. It simplifies certificate management, enforces authentication per request, and provides policy consistency for microservices. By incorporating security features at the proxy level, the system eliminates the need for developers to integrate security logic into individual services, thereby lessening operational overhead and the risk of security misconfigurations. Although the solution provides significant benefits from the security and manageability perspectives, some limitations may arise, like scalability in high-traffic setups and reliance on external identity providers for JWT verification. Future evolution can investigate the possibility of dynamic policy adjustment, automated token management, and real-time security monitoring, further enhancing its capabilities. This framework provides a developer-friendly, scalable, and secure communication solution, a highly feasible method for organizations that want to improve gRPC security without compromising agility or performance.

References
  • "Challenges of Implementing Microservice Architecture," opslevel.com, 2024. Available:https://www.opslevel.com/resources/challenges-of-implementing-microservice-architecture.
  • "Enhancing gRPC Security | Best Practices for Secure Communication in Microservices," bytesizego.com, 2024. Available: https://www.bytesizego.com/blog/grpc-security.
  • Chris Hendrix, "How to Secure Communication Between Microservices," Styra, 2023. Available: https://www.styra.com/blog/how-to-secure-communication-between-microservices/.
  • Nicole Jones, "gRPC API Security Best Practices," StackHawk, 2024. Available: https://www.stackhawk.com/blog/best-practices-for-grpc-security.
  • T. Farnham, "Supporting Disconnected Operation of Stateful Services Using an Envoy Enabled Dynamic Microservices Approach," CLOSER, pp.115-122, 2023.
  • N. Dattatreya Nadig, "Testing Resilience of Envoy Service Proxy with Microservices," Proceedings of diva-portal.org, 2019.
  • W. Zhang, "Improving Microservice Reliability with Istio," willezhang.github.io, 2020.
  • L. Calcote, Z. Butcher, Istio: Up and Running: Using a Service Mesh to Connect, Secure, Control, and Observe, O'Reilly Media, 2019.
  • M. Chigurupati, A. Jagtap, "Enhancing Microservice Resiliency and Reliability on Kubernetes with Istio: A Site Reliability Engineering Perspective," International Journal of Computer Trends and Technology, Vol.72, No.11, pp.17-22, 2024. DOI:10.14445/22312803/IJCTT-V72111P103.
  • R. Sharma, A. Singh, R. Sharma, A. Singh, "Policies and Rules," Getting Started with Istio Service Mesh: Manage Microservices in Kubernetes, pp.281-304, 2020.
  • J. Suomalainen, Defense-in-Depth Methods in Microservices Access Control, Master's Thesis, 2019.
  • M. G. de Almeida, E. D. Canedo, "Authentication and Authorization in Microservices Architecture: A Systematic Literature Review," Applied Sciences, Vol.12, No.6, p.3023, 2022. DOI:10.3390/app12063023.
  • A. Barabanov, D. Makrushin, "Authentication and Authorization in Microservice-Based Systems: Survey of Architecture Patterns," arXiv preprint arXiv:2009.02114, 2020.
  • H. Dong, Y. Zhang, H. Lee, K. Du, G. Tu, Y. Sun, "Mutual TLS in Practice: A Deep Dive into Certificate Configurations and Privacy Issues," Proceedings of the 2024 ACM on Internet Measurement Conference, pp.214-229, 2024. DOI:10.1145/3636512.
  • B. Campbell, J. Bradley, N. Sakimura, T. Lodderstedt, "RFC 8705: OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens," 2020.
  • N. Li, M. V. Tripunitara, "Security Analysis in Role-Based Access Control," ACM Transactions on Information and System Security (TISSEC), Vol.9, No.4, pp.391-420, 2006.
  • I. G. Buzhin, A. Y. Derevyankin, V. M. Antonova, A. P. Perevalov, "Comparative Analysis of the REST and gRPC Used in the Monitoring System of Communication Network Virtualized Infrastructure,"
  • T-Comm-Telecommunications and Transport, Vol.17, No.4, pp.50-55, 2023.
  • CGIAR Genetic Resources Policy Committee, "Summary Report of the Genetic Resources Policy Committee (GRPC) Meetings Held in 2005," 2006.
  • Y. Yu, A. Jatowt, A. Doucet, K. Sugiyama, M. Yoshikawa, "Multi-Timeline Summarization (MTLS): Improving Timeline Summarization by Generating Multiple Summaries," Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing (Volume 1: Long Papers), pp.377-387, 2021.
  • M. Pace, "Zero Trust Networks with Istio," Doctoral Dissertation, Politecnico di Torino, 2021.
  • F. Pallas, "Hook-in Privacy Techniques for gRPC-based Microservice Communication," 2024.
  • Z. Lai, Y. Xin, A. Yu, "Framework for Data Tracking Across Data Controllers and Processors," 2024.
  • L. Arstila, Securing Microservices with Deep Learning-Long Short-Term Memory Autoencoder for Anomaly Detection, Master's Thesis, 2023.
  • A. Dabholkar, V. Saraswat, "Ripping the Fabric: Attacks and Mitigations on Hyperledger Fabric," Applications and Techniques in Information Security: 10th International Conference, ATIS 2019, pp.300-311, 2019. DOI:10.1007/978-981-15-0871-424.
  • JamesNK, "Performance Best Practices with gRPC," microsoft.com, 2024. Available:https://learn.microsoft.com/en-us/aspnet/core/grpc/performance?view=aspnetcore-9.0.
  • A. de Waal, M. Weaver, T. Day, B. van der Heijden, "Silo-Busting: Overcoming the Greatest Threat to Organizational Performance," Sustainability, Vol.11, No.23, p.6860, 2019. DOI:10.3390/su11236860.
  • F. Pallas, "Hook-in Privacy Techniques for gRPC-based Microservice Communication," 2024.
  • E. Shmeleva, How Microservices Are Changing the Security Landscape, Master's Thesis, 2020.
  • L. M. G. Silva, gRPC and Protobuf: Performance and API Flexibility, Doctoral Dissertation, 2024.
  • Z. Li, S. He, Z. Yang, M. Ryu, K. Kim, R. Madduri, "Advances in APPFL: A Comprehensive and Extensible Federated Learning Framework," arXiv preprint arXiv:2409.11585, 2024.
  • A. Gazibegovic, F. Rejabo, "Design and Implementation of a Distributed Fleet Simulator," 2021.
  • "gRPC Proxy," etcd, 2022. Available: https://etcd.io/docs/v3.3/op-guide/grpcproxy/.
  • P. Skentzos, "Software Safety and Security Best Practices: A Case Study from Aerospace," SAE Technical Paper Series, 2024. DOI:10.4271/2024-01-2618.
  • M. Anedda, A. Floris, R. Girau, M. Fadda, P. Ruiu, M. Farina, A. Bonu, D. Giusto, "Privacy and Security Best Practices for IoT Solutions," IEEE Access, 2023. DOI:10.1109/ACCESS.2023.3345432.
  • D. Fett, P. Hosseyni, R. Kusters, "An Extensive Formal Security Analysis of the OpenID Financial-Grade API," 2019 IEEE Symposium on Security and Privacy (SP), 2019. DOI:10.1109/SP.2019.00065.
  • A. K. I. Riad, A. Barek, M. M. Rahman, M. S. Akter, T. Islam, M. A. Rahman, M. R. Mia, H. Shahriar, F. Wu, S. Ahamed, "Enhancing HIPAA Compliance in AI-Driven mHealth Devices Security and Privacy," 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC), 2024. DOI:10.1109/COMPSAC60750.2024.00099.
  • S. Mbonihankuye, A. Nkunzimana, A. Ndagijimana, "Healthcare Data Security Technology: HIPAA Compliance," Wireless Communications and Mobile Computing, 2019. DOI:10.1155/2019/1928704.
  • F. Elkourdi, C. Wei, L. Xiao, Z. Yu, O. Asan, "Exploring Current Practices and Challenges of HIPAA Compliance in Software Engineering: Scoping Review," IEEE Open Journal of Systems Engineering, 2024. DOI:10.1109/OJSE.2024.3380011.
  • N. Abbasi, D. A. Smith, "Cybersecurity in Healthcare: Securing Patient Health Information (PHI), HIPAA Compliance Framework and the Responsibilities of Healthcare Providers," Journal of Knowledge Learning and Science Technology, 2024. ISSN:2959-6386.
  • S. Selvaraj, "Preserving Patient Confidentiality: The Vital Role of Data Tokenization in Ensuring Data Security and Regulatory Compliance in Healthcare," International Journal of Science and Research (IJSR), 2024. DOI:10.21275/SR2412011409.
  • J. Duckworth, D. Gloe, B. Klein, "Software-Defined Multi-Tenancy on HPE Cray EX Supercomputers," 2023. Available:https://www.semanticscholar.org/paper/367afee8dfcb2a8f4ab42694061eb6eca8475dfa.
  • R. Molleti, "Highly Scalable and Secure Kubernetes Multi-Tenancy Architecture for Fintech," Journal of Engineering and Applied Sciences Technology, 2022. DOI:10.5281/zenodo.6789100.
  • J. Duckworth, D. Gloe, B. Klein, "Software-Defined Multi-Tenancy on HPE Cray EX Supercomputers," 2023. Available: https://www.semanticscholar.org/paper/367afee8dfcb2a8f4ab42694061eb6eca8475dfa.
  • G. Chikafa, S. Sheikholeslami, S. Niazi, J. Dowling, V. Vlassov, "Cloud-Native RStudio on Kubernetes for Hopsworks," arXiv preprint arXiv:2307.09132, 2023.
  • M. F. J. Potter, "The Integration of Ethernet Virtual Private Network in Kubernetes," Master's Thesis, 2019. Available: https://www.semanticscholar.org/paper/996acc4fe079e5ff5a6240decef9228130baebe3.
  • C. Katsakioris, C. Alverti, K. Nikas, S. Psomadakis, V. Karakostas, N. Koziris, "FaaSCell: A Case for Intra-Node Resource Management: Work-In-Progress," Proceedings of the 1st Workshop on SErverless Systems, Applications and MEthodologies, 2023. DOI:10.1145/3595620.3595630.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

gRPC Microservices mTLS JWT Authentication Security

Powered by PhDFocusTM