Enhancing CI/CD security with provenance metadata and supply chain best practices

Patel, Devashish Ghanshyambhai (2025) Enhancing CI/CD security with provenance metadata and supply chain best practices. World Journal of Advanced Engineering Technology and Sciences, 16 (1). 019-032. ISSN 2582-8266

[thumbnail of WJAETS-2025-1181.pdf] Article PDF
WJAETS-2025-1181.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download ( 729kB)

Abstract

Continuous Integration and Continuous Delivery (CI/CD) pipelines have transformed modern software development by enabling faster release cycles, increased collaboration, and improved automation. However, these benefits also introduce complex security challenges, particularly within software supply chains. As the sophistication of cyber threats evolves, adversaries are increasingly targeting CI/CD environments to infiltrate trusted software delivery processes. This journal article presents a comprehensive exploration of how integrating provenance metadata and adopting supply chain security best practices can mitigate these risks. Through analysis of recent cyber incidents, industry-standard frameworks, and detailed technical implementations, this paper outlines a practical and scalable approach for securing CI/CD pipelines. It emphasizes the role of transparency, traceability, and verification in building resilient DevOps workflows and provides actionable recommendations for both practitioners and researchers.

Item Type: Article
Official URL: https://doi.org/10.30574/wjaets.2025.16.1.1181
Uncontrolled Keywords: CI/CD Security; Software Supply Chain; Provenance Metadata; Zero-Trust Architecture
Depositing User: Editor Engineering Section
Date Deposited: 22 Aug 2025 07:20
Related URLs:
URI: https://eprint.scholarsrepository.com/id/eprint/5191