AUTOMATED SECURITY WORKFLOWS WITH CLOUD-NATIVE ORCHESTRATION

Authors

  • G. Prasadu, Dr. G Karthick, Dr.V.V.S.S.S. Balaram Author

Abstract

            Abstract - In recent years, the proliferation of cloud computing and the adoption of DevSecOps practices have revolutionized the landscape of software development along with security and deployment. However, with these advancements come new challenges, particularly in ensuring the security of cloud-native applications and environments. Traditional security approaches often struggle to keep pace with the dynamic and ephemeral nature of cloud-native architectures. To address these challenges, this paper proposes an innovative approach to security workflows leveraging cloud-native orchestration technologies. The Adaptive Security Orchestration for Cloud-Native Environments (ASOC) framework presents a groundbreaking approach to cybersecurity, specifically tailored for the dynamic and distributed nature of cloud-native architectures. By integrating security directly into the DevSecOps pipeline and harnessing the power of orchestration platforms, organizations can automate security processes, improve visibility, and enhance overall security posture. This paper explores the concept of automated security workflows with cloud-native orchestration, discussing the key components, benefits, and implementation considerations.  Through real-world examples and case studies, we demonstrate how organizations can enhance security while maintaining agility and scalability in their cloud-native environments. Additionally, we highlight the challenges and potential limitations of this approach, along with recommendations for overcoming them. By leveraging cloud-native orchestration for security workflows, organizations can effectively address the evolving threat landscape and ensure the integrity and resilience of their applications and infrastructure in the cloud. This paper aims to provide insights and guidance for security professionals, DevSecOps engineers, and IT leaders seeking to strengthen security practices in cloud-native environments.

Downloads

Published

2024-08-03

Issue

Section

Articles

How to Cite

AUTOMATED SECURITY WORKFLOWS WITH CLOUD-NATIVE ORCHESTRATION. (2024). JOURNAL OF BASIC SCIENCE AND ENGINEERING, 21(1), 1969-1984. https://yigkx.org.cn/index.php/jbse/article/view/289