Integrating Cybersecurity Best Practices in DevOps Pipelines for Securing Distributed Systems

Authors

  • Aditya Manikyala Java Developer, Pioneer Consulting Services Inc., 4335 Premier Plaza, Ashburn, VA 20147, USA
  • Hari Priya Kommineni Software Engineer, Marriott International, 7750 Wisconsin Ave, Bethesda, MD 20814, USA
  • Abhishekar Reddy Allam Software Developer, City National Bank, Los Angeles, CA, USA
  • Md. Nizamuddin Research Fellow, Faculty of Business and Economics, Universiti Malaya, Kuala Lumpur, Malaysia
  • Narayana Reddy Bommu Sridharlakshmi SAP Master Data Consultant, Data Solutions Inc., 28345 Beck Road, Wixom, MI 48393, USA

DOI:

https://doi.org/10.18034/abcjar.v12i1.773

Keywords:

Cybersecurity, DevOps, Best Practices, Continuous Integration, Distributed Systems, Security Automation, Threat Modeling

Abstract

This research examines how DevOps pipelines might improve distributed system security by incorporating cybersecurity best practices. The main goals are to find effective security solutions that can be integrated into the software development lifecycle and to evaluate their influence on agile vulnerability reduction. The study synthesizes literature and industry practices to highlight major conclusions via secondary data review. Early integration of security practices, security testing automation, and a security-first culture are essential for integrating cybersecurity into DevOps operations. The research also emphasizes constant monitoring and incident response to reduce security vulnerabilities. Policy recommendations include adaptive cybersecurity frameworks encouraging automated security procedures and cross-functional cooperation between development, operations, and security teams. Additionally, regulatory agencies should give explicit rules targeted to DevOps concerns. These tips help firms resist emerging cyber threats while preserving DevOps agility and speed. This holistic strategy helps firms secure sensitive data and maintain user and stakeholder confidence in a changing digital context.

Downloads

Download data is not yet available.

References

Adnan, M.., Just, M., Baillie, L., Kayacik, H. G. (2015). Investigating the Work Practices of Network Security Professionals. Information and Computer Security, 23(3), 347-367. https://doi.org/10.1108/ICS-07-2014-0049

Ahmmed, S., Narsina, D., Addimulam, S., & Boinapalli, N. R. (2021). AI-Powered Financial Engineering: Optimizing Risk Management and Investment Strategies. Asian Accounting and Auditing Advancement, 12(1), 37–45. https://4ajournal.com/article/view/96

Allam, A. R. (2020). Integrating Convolutional Neural Networks and Reinforcement Learning for Robotics Autonomy. NEXG AI Review of America, 1(1), 101-118.

Bhardwaj, A., Goundar, S. (2017). Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks. International Journal of Cloud Applications and Computing, 7(3), 59-75. https://doi.org/10.4018/IJCAC.2017070103

Boinapalli, N. R. (2020). Digital Transformation in U.S. Industries: AI as a Catalyst for Sustainable Growth. NEXG AI Review of America, 1(1), 70-84.

Cole, B. S., Moore, J. H. (2018). Eleven Quick Tips for Architecting Biomedical Informatics Workflows with Cloud Computing. PLoS Computational Biology, 14(3). https://doi.org/10.1371/journal.pcbi.1005994

de Vicente, J. M., Higuera, J. B., Bermejo Higuera, J. R. (2019). The Application of a New Secure Software Development Life Cycle (S-SDLC) with Agile Methodologies. Electronics, 8(11), 1218. https://doi.org/10.3390/electronics8111218

Deming, C., Pasam, P., Allam, A. R., Mohammed, R., Venkata, S. G. N., & Kothapalli, K. R. V. (2021). Real-Time Scheduling for Energy Optimization: Smart Grid Integration with Renewable Energy. Asia Pacific Journal of Energy and Environment, 8(2), 77-88. https://doi.org/10.18034/apjee.v8i2.762

Devarapu, K., Rahman, K., Kamisetty, A., & Narsina, D. (2019). MLOps-Driven Solutions for Real-Time Monitoring of Obesity and Its Impact on Heart Disease Risk: Enhancing Predictive Accuracy in Healthcare. International Journal of Reciprocal Symmetry and Theoretical Physics, 6, 43-55. https://upright.pub/index.php/ijrstp/article/view/160

Gade, P. K., Sridharlakshmi, N. R. B., Allam, A. R., & Koehler, S. (2021). Machine Learning-Enhanced Beamforming with Smart Antennas in Wireless Networks. ABC Journal of Advanced Research, 10(2), 207-220. https://doi.org/10.18034/abcjar.v10i2.770

Gade, P. K., Sridharlakshmi, N. R. B., Allam, A. R., Thompson, C. R., & Venkata, S. S. M. G. N. (2022). Blockchain’s Influence on Asset Management and Investment Strategies. Global Disclosure of Economics and Business, 11(2), 115-128. https://doi.org/10.18034/gdeb.v11i2.772

Gasca, R. M., Ceballos, R., Gómez-López, M. T., Torres, P. B. (2019). CyberSPL: A Framework for the Verification of Cybersecurity Policy Compliance of System Configurations Using Software Product Lines. Applied Sciences, 9(24), 5364. https://doi.org/10.3390/app9245364

Gummadi, J. C. S., Narsina, D., Karanam, R. K., Kamisetty, A., Talla, R. R., & Rodriguez, M. (2020). Corporate Governance in the Age of Artificial Intelligence: Balancing Innovation with Ethical Responsibility. Technology & Management Review, 5, 66-79. https://upright.pub/index.php/tmr/article/view/157

Gummadi, J. C. S., Thompson, C. R., Boinapalli, N. R., Talla, R. R., & Narsina, D. (2021). Robotics and Algorithmic Trading: A New Era in Stock Market Trend Analysis. Global Disclosure of Economics and Business, 10(2), 129-140. https://doi.org/10.18034/gdeb.v10i2.769

Jansen, C., Jeschke, S. (2018). Mitigating Risks of Digitalization Through Managed Industrial Security Services. AI & Society, 33(2), 163-173. https://doi.org/10.1007/s00146-018-0812-1

Karanam, R. K., Natakam, V. M., Boinapalli, N. R., Sridharlakshmi, N. R. B., Allam, A. R., Gade, P. K., Venkata, S. G. N., Kommineni, H. P., & Manikyala, A. (2018). Neural Networks in Algorithmic Trading for Financial Markets. Asian Accounting and Auditing Advancement, 9(1), 115–126. https://4ajournal.com/article/view/95

Kommineni, H. P., Fadziso, T., Gade, P. K., Venkata, S. S. M. G. N., & Manikyala, A. (2020). Quantifying Cybersecurity Investment Returns Using Risk Management Indicators. Asian Accounting and Auditing Advancement, 11(1), 117–128. Retrieved from https://4ajournal.com/article/view/97

Kothapalli, S., Manikyala, A., Kommineni, H. P., Venkata, S. G. N., Gade, P. K., Allam, A. R., Sridharlakshmi, N. R. B., Boinapalli, N. R., Onteddu, A. R., & Kundavaram, R. R. (2019). Code Refactoring Strategies for DevOps: Improving Software Maintainability and Scalability. ABC Research Alert, 7(3), 193–204. https://doi.org/10.18034/ra.v7i3.663

Kundavaram, R. R., Rahman, K., Devarapu, K., Narsina, D., Kamisetty, A., Gummadi, J. C. S., Talla, R. R., Onteddu, A. R., & Kothapalli, S. (2018). Predictive Analytics and Generative AI for Optimizing Cervical and Breast Cancer Outcomes: A Data-Centric Approach. ABC Research Alert, 6(3), 214-223. https://doi.org/10.18034/ra.v6i3.672

Li, Z., Shahidehpour, M., LIU, X. (2018). Cyber-secure Decentralized Energy Management for IoT-enabled Active Distribution Networks. Journal of Modern Power Systems and Clean Energy, 6(5), 900-917. https://doi.org/10.1007/s40565-018-0425-1

Morales, J., Yasar, H., Volkmann, A. (2018). Weaving Security into DevOps Practices in Highly Regulated Environments. International Journal of Systems and Software Security and Protection, 9(1), 18-46. https://doi.org/10.4018/IJSSSP.2018010102

Rodriguez, M., Mohammed, M. A., Mohammed, R., Pasam, P., Karanam, R. K., Vennapusa, S. C. R., & Boinapalli, N. R. (2019). Oracle EBS and Digital Transformation: Aligning Technology with Business Goals. Technology & Management Review, 4, 49-63. https://upright.pub/index.php/tmr/article/view/151

Rodriguez, M., Sridharlakshmi, N. R. B., Boinapalli, N. R., Allam, A. R., & Devarapu, K. (2020). Applying Convolutional Neural Networks for IoT Image Recognition. International Journal of Reciprocal Symmetry and Theoretical Physics, 7, 32-43. https://upright.pub/index.php/ijrstp/article/view/158

Sridharlakshmi, N. R. B. (2020). The Impact of Machine Learning on Multilingual Communication and Translation Automation. NEXG AI Review of America, 1(1), 85-100.

Sridharlakshmi, N. R. B. (2021). Data Analytics for Energy-Efficient Code Refactoring in Large-Scale Distributed Systems. Asia Pacific Journal of Energy and Environment, 8(2), 89-98. https://doi.org/10.18034/apjee.v8i2.771

Subramanian, A., Krishnamachariar, P., Gupta, M., Sharman, R. (2018). Auditing an Agile Development Operations Ecosystem. International Journal of Risk and Contingency Management, 7(4), 90-110. https://doi.org/10.4018/IJRCM.2018100105

Thompson, C. R., Sridharlakshmi, N. R. B., Mohammed, R., Boinapalli, N. R., Allam, A. R. (2022). Vehicle-to-Everything (V2X) Communication: Enabling Technologies and Applications in Automotive Electronics. Asian Journal of Applied Science and Engineering, 11(1), 85-98.

Thompson, C. R., Talla, R. R., Gummadi, J. C. S., Kamisetty, A (2019). Reinforcement Learning Techniques for Autonomous Robotics. Asian Journal of Applied Science and Engineering, 8(1), 85-96. https://ajase.net/article/view/94

Törngren, M., Grogan, P. T. (2018). How to Deal with the Complexity of Future Cyber-Physical Systems?. Designs, 2(4), 40. https://doi.org/10.3390/designs2040040

Venkata, S. S. M. G. N., Gade, P. K., Kommineni, H. P., Manikyala, A., & Boinapalli , N. R. (2022). Bridging UX and Robotics: Designing Intuitive Robotic Interfaces. Digitalization & Sustainability Review, 2(1), 43-56. https://upright.pub/index.php/dsr/article/view/159

Downloads

Published

2023-05-15

How to Cite

Manikyala, A., Kommineni, H. P., Allam, A. R., Nizamuddin, M., & Sridharlakshmi, N. R. B. (2023). Integrating Cybersecurity Best Practices in DevOps Pipelines for Securing Distributed Systems. ABC Journal of Advanced Research, 12(1), 57-70. https://doi.org/10.18034/abcjar.v12i1.773

Similar Articles

1-10 of 55

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)