| CPC H04L 63/20 (2013.01) [H04L 63/0263 (2013.01); H04L 63/0407 (2013.01); H04L 63/105 (2013.01)] | 18 Claims |

|
1. A computer-implemented method, comprising operations for:
identifying confidentiality levels of source data and of processed data at different points of an existing trajectory path in an application landscape by analyzing source metadata of the source data and processed metadata of the processed data;
identifying one or more trajectory paths that meet security levels that correspond to the confidentiality levels by analyzing microservice generated logs and an application landscape description with reference to the confidentiality levels of the source data and the processed data;
selecting a trajectory path from the one or more trajectory paths;
generating a workflow to move the source data and the processed data through the selected trajectory path; and
executing the workflow to move the source data and the processed data through microservices of the selected trajectory path while enforcing the security levels.
|