Security Risk Assessment of Continuous Deployment Pipelines in Multi-Cloud Architectures Using DevSecOps Metrics and Anomaly Detection Models
Keywords:
Continuous Deployment, Multi-Cloud Security, DevSecOps Metrics, Anomaly Detection, CI/CD Pipelines, Cloud Risk AssessmentAbstract
The rapid adoption of continuous deployment (CD) pipelines in multi-cloud architectures has significantly increased software delivery velocity, but it has also expanded the attack surface across heterogeneous cloud environments. Traditional security assessment approaches are often insufficient to capture dynamic risks emerging from automated pipelines, distributed infrastructure, and shared responsibility models. This research paper investigates how DevSecOps metrics combined with anomaly detection models can be leveraged to systematically assess and mitigate security risks in multi-cloud continuous deployment pipelines.
The study synthesizes research on DevSecOps measurement, cloud security monitoring, and anomaly detection techniques, and proposes a conceptual risk assessment framework. By integrating pipeline-level security metrics with behavioral anomaly detection, organizations can identify misconfigurations, malicious activities, and policy violations in near real time. The paper highlights practical implications for secure software delivery and outlines future research directions.
References
Fitzgerald, Brian, and Klaas-Jan Stol. “Continuous Software Engineering: A Roadmap and Agenda.” Journal of Systems and Software, vol. 123, no. 2, 2017, pp. 176–189.
Rahman, Akond Rahman, et al. “Characterizing the Influence of Continuous Integration on Software Development Practices.” Empirical Software Engineering, vol. 23, no. 4, 2018, pp. 2341–2375.
Gundaboina, A. (2022). Quantum Computing and Cloud Security: Future-Proofing Healthcare Data Protection. International Journal for Multidisciplinary Research, 4(4), 1–12. https://doi.org/10.36948/ijfmr.2022.v04i04.61014
Hilton, Michael, et al. “Usage, Costs, and Benefits of Continuous Integration in Open-Source Projects.” IEEE Software, vol. 33, no. 6, 2016, pp. 26–33.
Srividhya S, Genetic Programming for Automated Error Handling and Recovery in DevOps Environments. International Journal of DevOps (IJDO). 1(1), 2024, 1-10.
Zhang, Qi, Min Chen, and Lei Li. “Security and Privacy in Multi-Cloud Architectures: Issues and Challenges.” Future Generation Computer Systems, vol. 91, no. 1, 2019, pp. 573–585.
Gundaboina A. DevSecOps in Healthcare: Building Secure and Compliant Patient Engagement Applications. J Artif Intell Mach Learn & Data Sci 2024 2(4), 3052-3059. DOI: doi.org/10.51219/JAIMLD/anjan-gundaboina/629
Behl, Abhishek, and Kiran Behl. “Cybersecurity and Cyberwar: What Everyone Needs to Know.” Information Systems Frontiers, vol. 22, no. 3, 2020, pp. 555–568.
Hashizume, Keiko, et al. “An Analysis of Security Issues for Cloud Computing.” IEEE Internet Computing, vol. 17, no. 4, 2013, pp. 51–57.
Chandola, Varun, Arindam Banerjee, and Vipin Kumar. “Anomaly Detection: A Survey.” ACM Computing Surveys, vol. 41, no. 3, 2009, pp. 1–58.
Gundaboina, A. (2024). HITRUST Certification Best Practices: Streamlining Compliance for Healthcare Cloud Solutions. International Journal of Computer Science and Information Technology Research, 5(1), 76–94. https://ijcsitr.org/index.php/home/article/view/IJCSITR_2024_05_01_008
Ahmed, Mahmood, Ataul Bari, and Jiankun Hu. “A Survey of Network Anomaly Detection Techniques.” Journal of Network and Computer Applications, vol. 60, no. 1, 2016, pp. 19–36.
Xu, Xuejun, et al. “Log-Based Anomaly Detection for Cloud Applications.” IEEE Transactions on Services Computing, vol. 13, no. 3, 2020, pp. 475–489.
Kim, Gene, et al. The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations. IT Revolution Press, 2016.
Gundaboina, A. (2024). Automated Patch Management for Endpoints: Ensuring Compliance in Healthcare and Education Sectors. International Journal of Computer Science and Information Technology Research (IJCSITR), 5(2), 114–134. https://doi.org/10.63530/IJCSITR_2024_05_02_010
Pahl, Claus. “Containerization and the PaaS Cloud.” IEEE Cloud Computing, vol. 2, no. 3, 2015, pp. 24–31.
Bass, Len, Ingo Weber, and Liming Zhu. DevOps: A Software Architect’s Perspective. Addison-Wesley, 2015.
Alhazmi, Omar H., and Yashwant K. Malaiya. “Quantitative Vulnerability Assessment of Systems Software.” IEEE Transactions on Reliability, vol. 54, no. 4, 2005, pp. 619–628.
Scarfone, Karen, and Peter Mell. Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication, vol. 800, no. 1, 2012.
Gundaboina, A. (2024). Application Protection Platforms (CNAPP) for Healthcare: Safeguarding Patient Data in Cloud Infrastructure. International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences, 12(5), 1–12. https://doi.org/10.37082/IJIRMPS.v12.i5.232622
Humayed, A., et al. “Cyber-Physical Systems Security—A Survey.” ACM Computing Surveys, vol. 50, no. 3, 2017, pp. 1–36.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Srividhya.S (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.



