Building Automated Security Pipeline for Containerized Microservices

Palavesam, Kuppusamy Vellamadam and Arcot, Siva Venkatesh and Krishnamoorthy, Mahesh Vaijainthymala and ., Ebishdon G V (2025) Building Automated Security Pipeline for Containerized Microservices. Journal of Advances in Mathematics and Computer Science, 40 (2). pp. 53-66. ISSN 2456-9968

Full text not available from this repository.

Abstract

DevOps and microservices architectures are increasingly being adopted by organizations to improve software delivery agility, scalability, and speed. These techniques transform development workflows, resulting in faster innovation and deployment. However, they pose distinct security challenges, especially in containerized systems. Containers, as lightweight and scalable solutions, are essential to microservices; nonetheless, they are prone to hazards like misconfiguration, insecure images, and security vulnerabilities during execution. Addressing the security of these systems is critical for maintaining trust, safeguarding sensitive data, and allowing new cloud-native ecosystems. This comprises automating security checks including vulnerability scanning, security testing, and policy enforcement within the CI CD pipeline. Securing container images, ensuring compliance with corporate regulations, achieving runtime monitoring, and aiding developers with constant input are all key approaches. Automating these procedures allows firms to proactively mitigate risks, assure consistent protection, and build a culture in which security is seamlessly incorporated into the development lifecycle. This method enables enterprises to accomplish both faster delivery and comprehensive security, paving the door for scalable, safe, and high-performance microservices implementations. This article investigates the revolutionary impact of DevOps and microservices, the vital requirement for security in containerized settings, and solutions for developing automated security pipelines using tools like SAST and DAST, without sacrificing the speed and efficiency of CI/CD workflows.

Item Type: Article
Subjects: Open Asian Library > Mathematical Science
Depositing User: Unnamed user with email support@openasianlibrary.com
Date Deposited: 03 Mar 2025 04:59
Last Modified: 03 Mar 2025 04:59
URI: http://conference.peerreviewarticle.com/id/eprint/2073

Actions (login required)

View Item
View Item