DevSecOps Aware in Healthcare: SBOM-Driven Supply-Chain Assurance (SLSA) with Policy-Based Cost Guardrails and Continuous Security Validation

  • Nagarjuna Nellutla
Keywords: FinOps, DevSecOps, Healthcare Cloud, SBOM, Supply Chain Security, SLSA, Policy-as-Code, Compliance Automation, Cloud Cost Governance

Abstract

—Healthcare cloud systems must satisfy strict security and compliance controls while operating under constrained budgets. Traditional DevSecOps pipelines improve delivery velocity but often treat cost governance and supply-chain assurance as separate concerns, leaving gaps in artifact traceability, dependency risk visibility, and budget enforcement.
This paper proposes a FinOps-aware DevSecOps pipeline for healthcare workloads that integrates software bill of materials (SBOM) generation, SLSA-aligned supply-chain assurance checkpoints, and policy-as-code gates that jointly enforce security, compliance, and cost guardrails from build to deployment. The approach emphasizes auditable evidence, artifact integrity, and continuous validation to reduce release risk and cost drift without undermining delivery performance.

References

[1] K. J. Nahra, “Hipaa security enforcement is here,” IEEE Security & Privacy, vol. 6, no. 6, pp. 70–72, 2008.
[2] P. Haindl, P. Kochberger, and M. Sveggen, “A systematic literature review of inter-service security threats and mitigation strategies in microservice architectures,” IEEE Access, vol. 12, pp. 90252–90286, 2024.
[3] D. Burke, “Improving finops procedures with automation tools and framework changes for a cloud environment,” Master’s thesis, Aalto University, School of Electrical Engineering, Sep. 2024, permanent link: https://urn.fi/URN:NBN:fi:aalto-202411217270. [Online]. Available:
https://aaltodoc.aalto.fi/items/0670f49c-3d66-44e7-a2d7-d47c7a314f36
[4] S. H. B. I. Kumar, L. R. Sampaio, A. Martin, A. Brito, and C. Fetzer, “A comprehensive study on the impact of vulnerable dependencies on open-source software,” in 2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE), 2024, pp. 96–107.
[5] M. Balliu, B. Baudry, S. Bobadilla, M. Ekstedt, M. Monperrus, J. Ron, A. Sharma, G. Skoglund, C. Soto-Valero, and M. Wittlinger, “Challenges of producing software bill of materials for java,” IEEE Security & Privacy, vol. 21, no. 6, pp. 12–23, 2023.
[6] S. Zhou, H. Wu, and Z. Xue, “Grouped subspace linear semantic alignment for hyperspectral image transfer learning,” IEEE Transactions on Geoscience and Remote Sensing, vol. 60, pp. 1–16, 2022.
[7] X. Sun, Y. Cheng, X. Qu, and H. Li, “Design and implementation of security test pipeline based on devsecops,” in 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), vol. 4, 2021, pp. 532–535.
[8] K. J. Piczak, “Environmental sound classification with convolutional neural networks,” in 2015 IEEE 25th International Workshop on Machine Learning for Signal Processing (MLSP), 2015, pp. 1–6.
[9] Nellutla, N. (2022). Secure DevSecOps Workflows for Medical IoT Device Integration in Smart Hospitals. International Journal of AI, BigData, Computational and Management Studies, 3(1), 114-122. https://doi.org/10.63282/3050-9416.IJAIBDCMS-V3I1P113
[10] A. Srivastava, “Automated deployment of an end-to-end pipeline on amazon web services for real-time visual inspection using fast streaming high-definition images,” Master’s thesis, Clemson University, 2019.
[11] S. Yu, W. Song, X. Hu, and H. Yin, “On the correctness of metadatabased sbom generation: A differential analysis approach,” in 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2024, pp. 29–36.
[12] H. T. Phan and N. T. Nguyen, “A fuzzy graph convolutional network model for sentence-level sentiment analysis,” IEEE Transactions on Fuzzy Systems, vol. 32, no. 5, pp. 2953–2965, 2024.
[13] R. Rompicharla and B. R. P. V, “Continuous compliance model for hybrid multi-cloud through self-service orchestrator,” in 2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE), 2020, pp. 589–593.
[14] I. Saeed, S. Baras, and H. Hajjdiab, “Security and privacy of aws s3 and azure blob storage services,” in 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), 2019, pp. 388–394.
Published
2024-05-02
How to Cite
Nellutla, N. (2024). DevSecOps Aware in Healthcare: SBOM-Driven Supply-Chain Assurance (SLSA) with Policy-Based Cost Guardrails and Continuous Security Validation. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 10(1), 124-130. Retrieved from http://asianssr.org/index.php/ajct/article/view/1454

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.