IDEAS home Printed from https://ideas.repec.org/a/bfy/ojtejt/v6y2022i4p10-30id2723.html
   My bibliography  Save this article

Security Policy Enforcement and Behavioral Threat Detection in DevSecOps Pipelines

Author

Listed:
  • Khaja Kamaluddin

Abstract

Purpose: The evolution of DevSecOps reflects a critical shift from traditional DevOps by embedding security seamlessly throughout the software development lifecycle. This research explores the convergence of security policy enforcement with behavioral threat detection within CI/CD pipelines, focusing on practices and tools. We discuss the limitations of legacy DevOps security approaches, including late-stage vulnerability identification and insufficient runtime protection, and highlight the rising need for behavior-based detection to counter advanced threats and insider breaches. Materials and Methods: While static analysis and Infrastructure-as-Code scanning are useful strategies for evaluating security policies, a more comprehensive approach examines both compliance-focused tools and behavioral monitoring techniques. Findings: Compliance as-code frameworks define policies that are automatically checked, yet anomaly detection within system calls, container events, and source code changes offers a dynamic perspective on threats. Previously, integration of these checks into CI/CD platforms like Jenkins and GitLab relied on manual security reviews of alerts and build checkpoints to demonstrate how security checkpoints and alerts were managed before the adoption of AI-driven automation. Through case studies such as the Solar Winds breach and practical pipeline examples, we illustrate how combined policy and behavior-based controls can enhance threat prevention. However, we also identify the significant challenges to solutions, including high false positive rates and limited cross-layer correlation capabilities. Unique Contribution to Theory, Practice and Policy: Finally, the article looks ahead to the anticipated future of DevSecOps, emphasizing machine learning-driven behavior modelling, unified enforcement engines, and a zero-trust approach centered on identity and behavior analytics.

Suggested Citation

  • Khaja Kamaluddin, 2022. "Security Policy Enforcement and Behavioral Threat Detection in DevSecOps Pipelines," European Journal of Technology, AJPO Journals Limited, vol. 6(4), pages 10-30.
  • Handle: RePEc:bfy:ojtejt:v:6:y:2022:i:4:p:10-30:id:2723
    as

    Download full text from publisher

    File URL: https://ajpojournals.org/journals/index.php/EJT/article/view/2723
    Download Restriction: no
    ---><---

    More about this item

    Keywords

    DevSecOps (JEL: O33; O32); Behavioral Detection (JEL: D83; L86); CI/CD Security (JEL: O33; L86); Jenkins Pipeline (JEL: L86; O32); Runtime Threat Monitoring (JEL: D83; L86); Infrastructure as Code (IaC) (JEL: O33; L86); Falco (JEL: L86; K24);
    All these keywords.

    JEL classification:

    • O33 - Economic Development, Innovation, Technological Change, and Growth - - Innovation; Research and Development; Technological Change; Intellectual Property Rights - - - Technological Change: Choices and Consequences; Diffusion Processes
    • D83 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Search; Learning; Information and Knowledge; Communication; Belief; Unawareness
    • O33 - Economic Development, Innovation, Technological Change, and Growth - - Innovation; Research and Development; Technological Change; Intellectual Property Rights - - - Technological Change: Choices and Consequences; Diffusion Processes
    • L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software
    • D83 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Search; Learning; Information and Knowledge; Communication; Belief; Unawareness
    • O33 - Economic Development, Innovation, Technological Change, and Growth - - Innovation; Research and Development; Technological Change; Intellectual Property Rights - - - Technological Change: Choices and Consequences; Diffusion Processes
    • L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bfy:ojtejt:v:6:y:2022:i:4:p:10-30:id:2723. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chief Editor (email available below). General contact details of provider: https://ajpojournals.org/journals/index.php/EJT/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.