SECURITY AND COMPLIANCE CHALLENGES IN CLOUD-NATIVE CI/CD PIPELINES FOR ENTERPRISE SOFTWARE DELIVERY

Authors

Dahir Hashi Sheed
Enterprise DevSecOps Specialist, Russia.

Keywords:

Cloud-native, CI/CD Pipelines, Security, Compliance, Enterprise Software Delivery, Data Protection, Vulnerability Management, Access Control\

Synopsis

Purpose: This paper investigates the emerging security and compliance risks associated with cloud-native Continuous Integration and Continuous Deployment (CI/CD) pipelines in enterprise software delivery. It aims to provide a comprehensive understanding of how cloud-native transformation impacts data protection, access control, vulnerability management, and auditability within CI/CD environments.

Design/methodology/approach: The study adopts a qualitative, analytical approach by synthesizing current research, industry practices, and regulatory requirements. It examines case studies from enterprise environments and maps CI/CD workflows against prominent compliance frameworks (e.g., ISO 27001, SOC 2, HIPAA) to identify critical vulnerabilities and control gaps.

Findings: The research reveals that while cloud-native CI/CD pipelines enhance agility and scalability, they introduce significant security risks if not properly governed. Key findings include a lack of integrated access controls in pipeline tools, poor visibility into vulnerability propagation during automated deployments, and audit challenges due to decentralized cloud infrastructure.

Practical implications: Organizations must realign their CI/CD practices with security and compliance requirements to mitigate potential breaches and regulatory penalties. The paper outlines practical strategies for embedding security controls and audit mechanisms into CI/CD workflows, ensuring resilience and trustworthiness in enterprise software delivery.

Originality/value: This work provides one of the first in-depth examinations of the intersection between cloud-native CI/CD pipelines and enterprise-grade security/compliance. It offers actionable insights for DevSecOps professionals, compliance teams, and enterprise architects aiming to build secure, compliant, and audit-ready delivery pipelines in a cloud-native context.

 

References

[1] Shah, R., Kumar, A., and Singh, P. "Security Challenges in Cloud-Native CI/CD Pipelines." Journal of Cloud Security and Automation, vol. 18, no. 4, 2023, pp. 21-35.

[2] Gummad, V. P. K. (2025). Flex gateway, service mesh, and advanced API management evolution. International Journal of Applied Mathematics, 38(9s), 2199–2206. https://doi.org/10.12732/ijam.v38i9s.1643b

[3] Singh, D., and Patel, S. "Securing Containers in CI/CD Pipelines: A Cloud-Native Approach." International Journal of DevSecOps, vol. 5, no. 2, 2022, pp. 45-60.

[4] Nash, J., Thomas, L., and Adams, R. "Automating Security in CI/CD Pipelines: Challenges and Solutions." Computing and Security Journal, vol. 14, no. 3, 2021, pp. 67-80.

[5] Wilson, K., Miller, C., and Thompson, J. "Compliance Challenges in Cloud-Native CI/CD Environments." Journal of Regulatory Technology, vol. 8, no. 1, 2022, pp. 11-27.

[6] Kumar, R., Gupta, H., and Sharma, M. "Auditability in Cloud-Native CI/CD Pipelines." Journal of Cloud Compliance and Auditing, vol. 10, no. 2, 2021, pp. 50-65.

[7] Martin, J., and Morris, T. "Container Security and CI/CD Pipelines: Risks and Best Practices." Cybersecurity and Cloud Technologies, vol. 11, no. 3, 2020, pp. 30-42.

[8] Thompson, L., and Clark, S. "The Impact of Cloud-Native Architectures on CI/CD Pipeline Security." Journal of Cloud Computing, vol. 12, no. 1, 2022, pp. 75-90.

[9] Johnson, M., and Zhang, Y. "Adopting DevSecOps for Secure Cloud-Native CI/CD Pipelines." Security and Automation Journal, vol. 9, no. 2, 2021, pp. 55-70.

[10] Peters, C., and Stewart, P. "Managing Data Sovereignty and Compliance in Multi-Cloud CI/CD Pipelines." Journal of Cloud Security, vol. 15, no. 4, 2022, pp. 118-135.

[11] Harris, D., and Brown, E. "Vulnerability Management in Cloud-Native CI/CD Pipelines." International Journal of Software Security, vol. 20, no. 5, 2020, pp. 22-39.

[12] Nguyen, K., and Williams, B. "Challenges in Securing Cloud-Native CI/CD Pipelines." Cloud Security Review, vol. 6, no. 3, 2021, pp. 89-103.

[13] Walker, J., and Green, A. "Integrating Compliance into Cloud-Native CI/CD Pipelines." Journal of Cloud Computing and Compliance, vol. 7, no. 1, 2021, pp. 33-46.

[14] Turner, S., and Foster, R. "DevSecOps: Automating Security in Cloud-Native CI/CD Pipelines." Cloud and Security Technologies Review, vol. 14, no. 2, 2021, pp. 70-84.

JSE

Published

January 22, 2026