Vol. 1 No. 1 (2026): January 2026
Artificial Intelligence : Technology

Zero-Trust Architectures for Secure DevOps Automation in Enterprise AI Systems

Rajesh Lingam
Senior Software Engineer, Acton, Massachusetts, 01720, United States of America.

Published 2026-01-31

Keywords

  • Zero-Trust Architecture,
  • Secure DevOps Automation,
  • Enterprise AI Systems,
  • Anomaly Detection,
  • Autoencoder,
  • XGBoost,
  • DevSecOps
  • ...More
    Less

How to Cite

Rajesh Lingam. (2026). Zero-Trust Architectures for Secure DevOps Automation in Enterprise AI Systems. Milestone Transactions on Artificial Intelligence, 1(1), 18–33. https://doi.org/10.5281/zenodo.18439428

Abstract

The rapid adoption of Enterprise Artificial Intelligence (AI) and automated DevOps pipelines has significantly increased the attack surface of modern software ecosystems. Traditional perimeter-based security mechanisms are inadequate for protecting highly dynamic, cloud-native, and AI-driven environments. Enterprise AI systems increasingly rely on automated Development Operation (DevOp) pipelines, which introduce complex security challenges that traditional perimeter-based models fail to address. Zero-Trust Architecture (ZTA) provides continuous verification and least-privilege access but often lacks adaptability in dynamic DevOps environments. This paper proposes a hybrid machine learning–based zero-trust framework for secure DevOps automation by integrating an Autoencoder for unsupervised anomaly detection with an XGBoost classifier for trust decision-making. The framework is evaluated on the TII-SSRC-23 dataset and compared with Logistic Regression (LR), Random Forest (RF), Support Vector Machine (VM), and Long Short-Term Memory (LSTM) models. Experimental results show that the proposed approach achieves superior performance, with 99% accuracy and a ROC-AUC of 0.99. The findings demonstrate that the hybrid model enables scalable, adaptive, and reliable security enforcement for enterprise AI-driven DevOps ecosystems.

References

  1. Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2025). Zero trust architecture (NIST Special Publication No. 800-207). National Institute of Standards and Technology.
  2. Haider, M., Alshamrani, A., & Salah, K. (2025). Artificial intelligence–enabled zero trust security frameworks for cloud and enterprise systems. IEEE Communications Surveys & Tutorials, 27(1), 1–25.
  3. Kumar, R., Mishra, P., & Singh, A. K. (2025). A hybrid deep learning and ensemble learning approach for intrusion detection systems. Frontiers in Artificial Intelligence, 8, 1–15.
  4. Zhang, Y., Wang, L., Li, J., & Chen, H. (2025). Autoencoder-based feature learning combined with XGBoost for real-time cyber-attack detection. Scientific Reports, 15(1), 1–18.
  5. Ahmed, S., Hossain, M. S., & Rahman, T. (2025). Performance evaluation of classical machine learning models for cybersecurity anomaly detection. Journal of Information Security and Engineering Management, 12(2), 45–58.
  6. Verma, A., & Patel, R. (2025). Comparative analysis of random forest and support vector machine models for network intrusion detection. International Journal of Network Security, 27(3), 210–222.
  7. Kim, J., Lee, D., & Park, S. (2025). LSTM-based temporal modeling for intelligent intrusion detection in enterprise networks. IEEE Access, 13, 112340–112352.
  8. Rossi, F., Conti, M., & Bertino, E. (2025). Zero-trust-driven DevSecOps automation for cloud-native enterprise systems. Computer Standards & Interfaces, 86, 103–115.
  9. Panchumarthi, S. (2025, June). DevSecMLOps: A security framework for machine learning pipelines. TechRxiv preprint.
  10. Karthick, R. (2025, July). A unified framework for DevSecOps-driven AI applications in multi-cloud environments. Preprints.org.
  11. Coston, I. (2025). Cloud-native DevSecOps security architecture for distributed applications. Applied Sciences, 15.
  12. Micheal, L. (2025). Explainable AI in zero-trust security architectures. Unpublished manuscript.
  13. Ahmed, S. T., Kumar, V. V., Singh, K. K., Singh, A., Muthukumaran, V., & Gupta, D. (2022). 6G enabled federated learning for secure IoMT resource recommendation and propagation analysis. Computers and Electrical Engineering, 102, 108210.
  14. Kumar, S. S., Ahmed, S. T., Sandeep, S., Madheswaran, M., & Basha, S. M. (2022). Unstructured Oncological Image Cluster Identification Using Improved Unsupervised Clustering Techniques. Computers, Materials & Continua, 72(1).
  15. Ansari, M. F., & Ali, S. S. (2025). AI-driven zero-trust architecture for enhanced cybersecurity in dynamic network environments. International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering, 13(12).
  16. Anuganti, C. (2025). Scalable multi-tenant data lakes with zero trust security architecture. International Journal for Multidisciplinary Research, 7(2), 1–16.
  17. Lingam, R. (2025). AI-powered framework for evaluating child-friendly mobile applications. International Journal of Human Computations and Intelligence, 4(4), 535–549.
  18. Fathima, A. S., Basha, S. M., Ahmed, S. T., Khan, S. B., Asiri, F., Basheer, S., & Shukla, M. (2025). Empowering consumer healthcare through sensor-rich devices using federated learning for secure resource recommendation. IEEE Transactions on Consumer Electronics.
  19. Singh, K. D., & Ahmed, S. T. (2020, July). Systematic linear word string recognition and evaluation technique. In 2020 international conference on communication and signal processing (ICCSP) (pp. 0545-0548). IEEE.