Articles
| Open Access |
Advancing Automated Security In Devsecops: Integrating AI, Big Data, And Cloud-Native Approaches For Robust CI/CD Pipelines
Johnathan R. Keller , Department of Computer Science, University of Edinburgh, United KingdomAbstract
The convergence of development, security, and operations (DevSecOps) has become essential in modern software engineering, emphasizing the integration of security practices directly into continuous integration and continuous deployment (CI/CD) pipelines. As software systems evolve toward cloud-native architectures and increasingly complex deployment environments, traditional security testing methods have proven insufficient to detect sophisticated vulnerabilities in real-time. This research investigates the implementation of automated security mechanisms within DevSecOps pipelines, focusing on static and dynamic testing, AI-assisted vulnerability detection, big data-driven threat intelligence, and heuristic optimization algorithms. By synthesizing insights from contemporary research, the study identifies critical gaps in current DevSecOps practices, including latency in vulnerability detection, limited integration of predictive analytics, and insufficient alignment of automated security testing with rapid deployment cycles. A methodology emphasizing end-to-end automation, leveraging genetic algorithms for heuristic optimization, and integrating cloud-native security frameworks is proposed. The findings reveal that multi-layered automation enhances security posture, reduces detection latency, and ensures compliance with contemporary security standards. Moreover, the study highlights the strategic role of AI and big data analytics in real-time anomaly detection and predictive threat mitigation. The implications extend to software development organizations, cloud service providers, and security operations centers, providing a roadmap for achieving resilient, scalable, and proactive DevSecOps environments. This research contributes to the ongoing discourse on security automation by offering comprehensive theoretical insights and practical guidance for implementing advanced DevSecOps frameworks in complex, cloud-centric ecosystems.
Keywords
DevSecOps, automated security testing, CI/CD pipeline
References
Hsu, T. H. C. (2019). Practical security automation and testing: tools and techniques for automated security scanning and testing in DevSecOps. Packt Publishing Ltd.
Thantharate, P., & Anurag, T. (2023, September). GeneticSecOps: harnessing heuristic genetic algorithms for automated security testing and vulnerability detection in DevSecOps. In 2023, the 6th International Conference on Contemporary Computing and Informatics (IC3I) (Vol. 6, pp. 2271–2278). IEEE.
Marandi, M., Bertia, A., & Silas, S. (2023, July). Implementing and automating security scanning in a DevSecOps CI/CD pipeline. In 2023 World Conference on Communication and Computing (WCONF) (pp. 1–6). IEEE.
Jammeh, B. (2020). DevSecOps: Security expertise is a key to automated testing in the CI/CD pipeline. Bournemouth University.
Putra, A. M., & Kabetta, H. (2022, October). Implementation of DevSecOps by integrating static and dynamic security testing in CI/CD pipelines. In 2022 IEEE International Conference of Computer Science and Information Technology (ICOSNIKOM) (pp. 1–6). IEEE.
Abiola, O. B., & Olufemi, O. G. (2023). An enhanced CICD pipeline: A DevSecOps approach. International Journal of Computer Applications, 184(48), 8–13.
Lorona, N. (2023). Strategies Employed by Project Managers when Adopting Agile DevSecOps to Manage Software Development in the DoD (Doctoral dissertation, Colorado Technical University).
Jones, A. J. (2023). Quantitative Exploratory Investigation into the Barriers to Adopting DevSecOps Methodology for Security Operations Centers (Doctoral dissertation, Capitol Technology University).
Bitra, P., & Achanta, C. S. (2021). Development and Evaluation of an Artefact Model to Support Security Compliance for DevSecOps.
Rajapaksha, S., Senanayake, J., Kalutarage, H., & Al-Kadri, M. O. (2023, September). Enhancing security assurance in software development: AI-based vulnerable code detection with static analysis. In European Symposium on Research in Computer Security (pp. 341–356). Cham: Springer Nature Switzerland.
Malik, G. (2025). Integrating Threat Intelligence with DevSecOps: Automating Risk Mitigation before Code Hits Production. Utilitas Mathematica, 122(2), 309-340.
Anderson, J., Brown, P., & Patel, M. Security challenges in cloud-native architectures: A survey. IEEE Transactions on Cloud Computing, 6(2), 245-258, June 2018.
Lee, Y., Kim, J., & Cho, D. (2018). DevSecOps for secure cloud-native development: A case study. IEEE Software, 35(6), 72-78, Nov.-Dec. 2018.
Smith, A., Wilson, R., & Zhang, L. (2019). Integrating security into DevOps: A full-stack approach to DevSecOps. Proceedings of the IEEE International Conference on Software Engineering, May 2019, 304-313.
Zhang, T., Li, H., & Wang, P. (2020). AI-based anomaly detection for cloud-native applications. IEEE Transactions on Cloud Computing, 8(2), 450-460, Apr. 2020.
Wang, J., Kumar, S., & Patel, A. (2019). Big data-driven threat intelligence in cloud environments. IEEE Transactions on Information Forensics and Security, 14(4), 915-929, Apr. 2019.
Patel, A., Zhang, J., & Liu, M. (2017). Real-time big data security analytics using Apache Spark. IEEE Transactions on Big Data, 3(2), 302-313, June 2017.
Rao, P., & Kumar, N. (2019). AI and big data for real-time cloud security: A framework for threat detection and response. IEEE Access, 7, 123456-123469, Dec. 2019.
Article Statistics
Downloads
Copyright License
Copyright (c) 2025 Johnathan R. Keller

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright and Ethics:
- Authors are responsible for obtaining permission to use any copyrighted materials included in their manuscript.
- Authors are also responsible for ensuring that their research was conducted in an ethical manner and in compliance with institutional and national guidelines for the care and use of animals or human subjects.
- By submitting a manuscript to International Journal of Computer Science & Information System (IJCSIS), authors agree to transfer copyright to the journal if the manuscript is accepted for publication.