Articles
| Open Access |
A Threat-Intelligence-Driven Adaptive Devsecops Architecture With Integrated Data Management And Privacy-By-Design Controls For Continuous Security
Anya L. Sharma , Department of Cybersecurity and Threat Modeling, University of Singapore, SingaporeAbstract
This article presents an integrative theoretical framework for Adaptive DevSecOps that tightly couples threat intelligence, dynamic data management for continuous retraining, privacy-by-design, and containerized CI/CD security to enable automated, risk-aware security decisions before code reaches production. The work synthesizes multiple strands of recent scholarship and practitioner guidance—threat intelligence mapping, blockchain-enabled intelligence lifecycle support, continuous retraining pipelines, DevOps metrics and project alignment, container security techniques, regulatory privacy constraints, and event-consistency tradeoffs in distributed systems—into a single, coherent model for securing modern cloud-native software delivery. The article first identifies gaps in contemporary DevSecOps practice, then defines methodological constructs for integrating automated threat feeds, retraining controls, and privacy-preserving data governance within CI/CD workflows. A detailed, text-based methodology describes architecture patterns, data flows, decision points, and governance controls; results are presented as conceptual outcomes and expected operational benefits, grounded in the referenced literature. The discussion examines theoretical implications, counter-arguments, limitations (including data quality, false positives, and compliance complexity), and avenues for future empirical validation. This contribution intends to guide researchers and practitioners toward provable, auditable, and privacy-respecting automation of security actions in the software delivery lifecycle.
Keywords
DevSecOps, threat intelligence, continuous retraining
References
Ahmed, I., Mia, R., & Shakil, N. A. F. (2023). Mapping blockchain and data science to the cyber threat intelligence lifecycle: Collection, processing, analysis, and dissemination. Journal of Applied Cybersecurity Analytics, Intelligence, and Decision-Making Systems, 13(3), 1-37.
Alluri, R. R., Venkat, T. A., Pal, D. K. D., Yellepeddi, S. M., & Thota, S. (2020). DevOps Project Management: Aligning Development and Operations Teams. Journal of Science & Technology, 1(1), 464-487.
Anthony, R. T. (2023). Barriers to Adoption of Advanced Cybersecurity Tools in Organizations. Capitol Technology University.
Baumann, N., Kusmenko, E., Ritz, J., Rumpe, B., & Weber, M. B. (2022, October). Dynamic data management for continuous retraining. In Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings (pp. 359-366).
Bass, L., Weber, I., & Zhu, L. DevOps: A Software Architect’s Perspective. Addison-Wesley Professional, 2015.
Bhajaria, N. (2022). Data Privacy: A runbook for engineers. Simon and Schuster.
Brás, A. E. R. (2021). Container Security in CI/CD Pipelines (Master's thesis, Universidade de Aveiro (Portugal)).
Hafiz, M., Adamczyk, P., & Johnson, R. (2006). Growing a Security Pattern Language for Web Applications. Proceedings of the 13th Conference on Pattern Languages of Programs.
Kersten, M. (2018). DevOps Metrics: Quantifying the Performance of the DevOps Lifecycle. IEEE Software, 35(6), 94–97.
Malik, G. (2025). Integrating Threat Intelligence with DevSecOps: Automating Risk Mitigation before Code Hits Production. Utilitas Mathematica, 122(2), 309–340.
M. Sonar & O. Pedersen. (2020). Cloud-Native Security: Advancing DevSecOps Capabilities with AWS (AWS Whitepaper).
NIST. (2018). Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1.
Puppet Labs. (2019). State of DevOps Report.
Syverson, P. (2019). AI in Security Operations: Leveraging Machine Learning for Better Detection. IEEE Security & Privacy Magazine, 17(5), 22–29.
European Parliament. (2018). General Data Protection Regulation (GDPR).
Article Statistics
Downloads
Copyright License
Copyright (c) 2025 Anya L. Sharma

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright and Ethics:
- Authors are responsible for obtaining permission to use any copyrighted materials included in their manuscript.
- Authors are also responsible for ensuring that their research was conducted in an ethical manner and in compliance with institutional and national guidelines for the care and use of animals or human subjects.
- By submitting a manuscript to International Journal of Computer Science & Information System (IJCSIS), authors agree to transfer copyright to the journal if the manuscript is accepted for publication.