EconPapers    
Economics at your fingertips  
 

Security Policy Enforcement and Behavioral Threat Detection in DevSecOps Pipelines

Khaja Kamaluddin ()

European Journal of Technology, 2022, vol. 6, issue 4, 10-30

Abstract: Purpose: The evolution of DevSecOps reflects a critical shift from traditional DevOps by embedding security seamlessly throughout the software development lifecycle. This research explores the convergence of security policy enforcement with behavioral threat detection within CI/CD pipelines, focusing on practices and tools. We discuss the limitations of legacy DevOps security approaches, including late-stage vulnerability identification and insufficient runtime protection, and highlight the rising need for behavior-based detection to counter advanced threats and insider breaches. Materials and Methods: While static analysis and Infrastructure-as-Code scanning are useful strategies for evaluating security policies, a more comprehensive approach examines both compliance-focused tools and behavioral monitoring techniques. Findings: Compliance as-code frameworks define policies that are automatically checked, yet anomaly detection within system calls, container events, and source code changes offers a dynamic perspective on threats. Previously, integration of these checks into CI/CD platforms like Jenkins and GitLab relied on manual security reviews of alerts and build checkpoints to demonstrate how security checkpoints and alerts were managed before the adoption of AI-driven automation. Through case studies such as the Solar Winds breach and practical pipeline examples, we illustrate how combined policy and behavior-based controls can enhance threat prevention. However, we also identify the significant challenges to solutions, including high false positive rates and limited cross-layer correlation capabilities. Unique Contribution to Theory, Practice and Policy: Finally, the article looks ahead to the anticipated future of DevSecOps, emphasizing machine learning-driven behavior modelling, unified enforcement engines, and a zero-trust approach centered on identity and behavior analytics.

Keywords: DevSecOps (JEL: O33; O32); Behavioral Detection (JEL: D83; L86); CI/CD Security (JEL: O33; L86); Jenkins Pipeline (JEL: L86; O32); Runtime Threat Monitoring (JEL: D83; L86); Infrastructure as Code (IaC) (JEL: O33; L86); Falco (JEL: L86; K24) (search for similar items in EconPapers)
Date: 2022
References: Add references at CitEc
Citations:

Downloads: (external link)
https://ajpojournals.org/journals/index.php/EJT/article/view/2723 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:bfy:ojtejt:v:6:y:2022:i:4:p:10-30:id:2723

Access Statistics for this article

More articles in European Journal of Technology from AJPO Journals Limited
Bibliographic data for series maintained by Chief Editor ().

 
Page updated 2025-06-28
Handle: RePEc:bfy:ojtejt:v:6:y:2022:i:4:p:10-30:id:2723