Security Risk Assessment of Continuous Deployment Pipelines in Multi-Cloud Architectures Using DevSecOps Metrics and Anomaly Detection Models

Authors

  • Srividhya.S Independent Researcher, India. Author

Keywords:

Continuous Deployment, Multi-Cloud Security, DevSecOps Metrics, Anomaly Detection, CI/CD Pipelines, Cloud Risk Assessment

Abstract

The rapid adoption of continuous deployment (CD) pipelines in multi-cloud architectures has significantly increased software delivery velocity, but it has also expanded the attack surface across heterogeneous cloud environments. Traditional security assessment approaches are often insufficient to capture dynamic risks emerging from automated pipelines, distributed infrastructure, and shared responsibility models. This research paper investigates how DevSecOps metrics combined with anomaly detection models can be leveraged to systematically assess and mitigate security risks in multi-cloud continuous deployment pipelines.

The study synthesizes research on DevSecOps measurement, cloud security monitoring, and anomaly detection techniques, and proposes a conceptual risk assessment framework. By integrating pipeline-level security metrics with behavioral anomaly detection, organizations can identify misconfigurations, malicious activities, and policy violations in near real time. The paper highlights practical implications for secure software delivery and outlines future research directions.

References

Fitzgerald, Brian, and Klaas-Jan Stol. “Continuous Software Engineering: A Roadmap and Agenda.” Journal of Systems and Software, vol. 123, no. 2, 2017, pp. 176–189.

Rahman, Akond Rahman, et al. “Characterizing the Influence of Continuous Integration on Software Development Practices.” Empirical Software Engineering, vol. 23, no. 4, 2018, pp. 2341–2375.

Gundaboina, A. (2022). Quantum Computing and Cloud Security: Future-Proofing Healthcare Data Protection. International Journal for Multidisciplinary Research, 4(4), 1–12. https://doi.org/10.36948/ijfmr.2022.v04i04.61014

Hilton, Michael, et al. “Usage, Costs, and Benefits of Continuous Integration in Open-Source Projects.” IEEE Software, vol. 33, no. 6, 2016, pp. 26–33.

Srividhya S, Genetic Programming for Automated Error Handling and Recovery in DevOps Environments. International Journal of DevOps (IJDO). 1(1), 2024, 1-10.

Zhang, Qi, Min Chen, and Lei Li. “Security and Privacy in Multi-Cloud Architectures: Issues and Challenges.” Future Generation Computer Systems, vol. 91, no. 1, 2019, pp. 573–585.

Gundaboina A. DevSecOps in Healthcare: Building Secure and Compliant Patient Engagement Applications. J Artif Intell Mach Learn & Data Sci 2024 2(4), 3052-3059. DOI: doi.org/10.51219/JAIMLD/anjan-gundaboina/629

Behl, Abhishek, and Kiran Behl. “Cybersecurity and Cyberwar: What Everyone Needs to Know.” Information Systems Frontiers, vol. 22, no. 3, 2020, pp. 555–568.

Hashizume, Keiko, et al. “An Analysis of Security Issues for Cloud Computing.” IEEE Internet Computing, vol. 17, no. 4, 2013, pp. 51–57.

Chandola, Varun, Arindam Banerjee, and Vipin Kumar. “Anomaly Detection: A Survey.” ACM Computing Surveys, vol. 41, no. 3, 2009, pp. 1–58.

Gundaboina, A. (2024). HITRUST Certification Best Practices: Streamlining Compliance for Healthcare Cloud Solutions. International Journal of Computer Science and Information Technology Research, 5(1), 76–94. https://ijcsitr.org/index.php/home/article/view/IJCSITR_2024_05_01_008

Ahmed, Mahmood, Ataul Bari, and Jiankun Hu. “A Survey of Network Anomaly Detection Techniques.” Journal of Network and Computer Applications, vol. 60, no. 1, 2016, pp. 19–36.

Xu, Xuejun, et al. “Log-Based Anomaly Detection for Cloud Applications.” IEEE Transactions on Services Computing, vol. 13, no. 3, 2020, pp. 475–489.

Kim, Gene, et al. The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations. IT Revolution Press, 2016.

Gundaboina, A. (2024). Automated Patch Management for Endpoints: Ensuring Compliance in Healthcare and Education Sectors. International Journal of Computer Science and Information Technology Research (IJCSITR), 5(2), 114–134. https://doi.org/10.63530/IJCSITR_2024_05_02_010

Pahl, Claus. “Containerization and the PaaS Cloud.” IEEE Cloud Computing, vol. 2, no. 3, 2015, pp. 24–31.

Bass, Len, Ingo Weber, and Liming Zhu. DevOps: A Software Architect’s Perspective. Addison-Wesley, 2015.

Alhazmi, Omar H., and Yashwant K. Malaiya. “Quantitative Vulnerability Assessment of Systems Software.” IEEE Transactions on Reliability, vol. 54, no. 4, 2005, pp. 619–628.

Scarfone, Karen, and Peter Mell. Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication, vol. 800, no. 1, 2012.

Gundaboina, A. (2024). Application Protection Platforms (CNAPP) for Healthcare: Safeguarding Patient Data in Cloud Infrastructure. International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences, 12(5), 1–12. https://doi.org/10.37082/IJIRMPS.v12.i5.232622

Humayed, A., et al. “Cyber-Physical Systems Security—A Survey.” ACM Computing Surveys, vol. 50, no. 3, 2017, pp. 1–36.

Downloads

Published

2025-06-13

How to Cite

Srividhya.S. (2025). Security Risk Assessment of Continuous Deployment Pipelines in Multi-Cloud Architectures Using DevSecOps Metrics and Anomaly Detection Models. International Journal of Advanced Research in Cyber Security, 6(3), 28–34. https://ijarc.com/index.php/journal/article/view/IJARC.6.3.5