Articles | Open Access |

A Threat-Intelligence-Driven Adaptive Devsecops Architecture With Integrated Data Management And Privacy-By-Design Controls For Continuous Security

Anya L. Sharma , Department of Cybersecurity and Threat Modeling, University of Singapore, Singapore

Abstract

This article presents an integrative theoretical framework for Adaptive DevSecOps that tightly couples threat intelligence, dynamic data management for continuous retraining, privacy-by-design, and containerized CI/CD security to enable automated, risk-aware security decisions before code reaches production. The work synthesizes multiple strands of recent scholarship and practitioner guidance—threat intelligence mapping, blockchain-enabled intelligence lifecycle support, continuous retraining pipelines, DevOps metrics and project alignment, container security techniques, regulatory privacy constraints, and event-consistency tradeoffs in distributed systems—into a single, coherent model for securing modern cloud-native software delivery. The article first identifies gaps in contemporary DevSecOps practice, then defines methodological constructs for integrating automated threat feeds, retraining controls, and privacy-preserving data governance within CI/CD workflows. A detailed, text-based methodology describes architecture patterns, data flows, decision points, and governance controls; results are presented as conceptual outcomes and expected operational benefits, grounded in the referenced literature. The discussion examines theoretical implications, counter-arguments, limitations (including data quality, false positives, and compliance complexity), and avenues for future empirical validation. This contribution intends to guide researchers and practitioners toward provable, auditable, and privacy-respecting automation of security actions in the software delivery lifecycle.

Keywords

DevSecOps, threat intelligence, continuous retraining

References

Ahmed, I., Mia, R., & Shakil, N. A. F. (2023). Mapping blockchain and data science to the cyber threat intelligence lifecycle: Collection, processing, analysis, and dissemination. Journal of Applied Cybersecurity Analytics, Intelligence, and Decision-Making Systems, 13(3), 1-37.

Alluri, R. R., Venkat, T. A., Pal, D. K. D., Yellepeddi, S. M., & Thota, S. (2020). DevOps Project Management: Aligning Development and Operations Teams. Journal of Science & Technology, 1(1), 464-487.

Anthony, R. T. (2023). Barriers to Adoption of Advanced Cybersecurity Tools in Organizations. Capitol Technology University.

Baumann, N., Kusmenko, E., Ritz, J., Rumpe, B., & Weber, M. B. (2022, October). Dynamic data management for continuous retraining. In Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings (pp. 359-366).

Bass, L., Weber, I., & Zhu, L. DevOps: A Software Architect’s Perspective. Addison-Wesley Professional, 2015.

Bhajaria, N. (2022). Data Privacy: A runbook for engineers. Simon and Schuster.

Brás, A. E. R. (2021). Container Security in CI/CD Pipelines (Master's thesis, Universidade de Aveiro (Portugal)).

Hafiz, M., Adamczyk, P., & Johnson, R. (2006). Growing a Security Pattern Language for Web Applications. Proceedings of the 13th Conference on Pattern Languages of Programs.

Kersten, M. (2018). DevOps Metrics: Quantifying the Performance of the DevOps Lifecycle. IEEE Software, 35(6), 94–97.

Malik, G. (2025). Integrating Threat Intelligence with DevSecOps: Automating Risk Mitigation before Code Hits Production. Utilitas Mathematica, 122(2), 309–340.

M. Sonar & O. Pedersen. (2020). Cloud-Native Security: Advancing DevSecOps Capabilities with AWS (AWS Whitepaper).

NIST. (2018). Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1.

Puppet Labs. (2019). State of DevOps Report.

Syverson, P. (2019). AI in Security Operations: Leveraging Machine Learning for Better Detection. IEEE Security & Privacy Magazine, 17(5), 22–29.

European Parliament. (2018). General Data Protection Regulation (GDPR).

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

Anya L. Sharma. (2025). A Threat-Intelligence-Driven Adaptive Devsecops Architecture With Integrated Data Management And Privacy-By-Design Controls For Continuous Security. International Journal of Computer Science & Information System, 10(09), 21–29. Retrieved from https://scientiamreearch.org/index.php/ijcsis/article/view/188