An Autonomous Security Validation Architecture for Linux Systems in Regulated Financial Environments
Keywords:
Autonomous Security Validation, Enterprise Linux Security, Financial Services Compliance, Continuous Security Assessment, Regulated Environments, Control Validation, Risk Prioritization, Configuration DriftAbstract
Linux systems are widely deployed across regulated financial environments to support critical workloads such as transaction processing, customer data management, risk analytics, and regulatory reporting. These systems must continuously comply with stringent security and regulatory requirements while accommodating frequent operational changes driven by patching, configuration updates, and incident response. Traditional security validation approaches, which rely on periodic audits and manual assessments, provide only point-in-time assurance and struggle to maintain visibility into security posture in dynamic environments. This paper presents an autonomous security validation architecture for Linux systems operating in regulated financial environments. The proposed architecture combines declarative security control definitions, continuous runtime validation, and autonomous analysis components to assess security posture without relying solely on manual intervention. Validation processes continuously compare observed system state against approved security baselines, while autonomous analysis identifies recurring validation failures, correlates deviations across systems, and prioritizes risks based on regulatory and operational impact. The architecture is designed to support autonomy in validation and analysis while preserving explainability, auditability, and human oversighted requirements in regulated financial contexts. Through architectural design and controlled evaluation in enterprise Linux environments aligned with financial regulatory expectations, the study demonstrates that autonomous security validation improves detection timeliness, reduces configuration drift, and strengthens compliance readiness. The findings indicate that autonomous validation architectures can enhance security assurance in regulated environments when implemented with appropriate governance controls.
Downloads
References
NIST, Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53 Rev. 5, 2020.
NIST, Risk Management Framework for Information Systems and Organizations, NIST SP 800-37 Rev. 2, 2018.
NIST, Guide for Security Configuration Management, NIST SP 800-128, 2011.
NIST, Continuous Monitoring (ISCM) for Federal Information Systems, NIST SP 800-137, 2011.
NIST, Risk Management Guide for Information Technology Systems, NIST SP 800-30 Rev. 1, 2012.
NIST, Security Continuous Monitoring Strategy, NIST IR 8011, 2017.
ISO/IEC, Information Security Management Systems, ISO/IEC 27001:2022.
ISO/IEC, Information Security Controls, ISO/IEC 27002:2022.
PCI Security Standards Council, PCI DSS v4.0, 2022.
Center for Internet Security, CIS Benchmarks for Linux Operating Systems, CIS, 2023.
MITRE, ATT&CK Framework for Enterprise, 2023.
D. Bodeau and R. Graubart, Cyber Resiliency Engineering Framework. MITRE, 2011.
M. Bishop, Computer Security: Art and Science. Addison-Wesley, 2018.
R. Anderson, Security Engineering, 3rd ed. Wiley, 2020.
J. Andress, The Basics of Information Security. Syngress, 2020.
M. Fowler, Infrastructure as Code. O’Reilly Media, 2016.
K. Morris, Infrastructure as Code: Dynamic Systems for the Cloud Age. O’Reilly Media, 2021.
L. Bass, I. Weber, and L. Zhu, DevOps: A Software Architect’s Perspective. Addison-Wesley, 2015.
A. Humble and D. Farley, Continuous Delivery. Addison-Wesley, 2010.
J. Turnbull et al., The DevOps Handbook. IT Revolution Press, 2016.
T. Limoncelli et al., Site Reliability Engineering. O’Reilly Media, 2016.
J. Pescatore, “Continuous controls monitoring,” IEEE Computer, vol. 48, no. 6, pp. 94–97, 2015.
S. Sannareddy, “GenAI-driven observability and incident response control plane for cloud-native systems,” Int. J. Research and Applied Innovations, vol. 7, no. 6, pp. 11817–11828, 2024, doi: 10.15662/IJRAI.2024.0706027.
E. Bertino and K. R. Lakkaraju, “Policy monitoring and compliance,” IEEE Security & Privacy, vol. 10, no. 5, pp. 72–77, 2012.
J. Zhu and J. B. D. Joshi, “Automated security compliance checking,” IEEE Trans. Dependable Secure Comput., vol. 11, no. 4, pp. 313–326, 2014.
S. Foley and W. Fitzgerald, “Management of security policy configuration,” IEEE Computer, vol. 33, no. 7, pp. 80–87, 2000.
A. Kott and W. Arnold, “Autonomous cyber defense,” IEEE Intelligent Systems, vol. 28, no. 1, pp. 16–24, 2013.
A. Shameli-Sendi et al., “Toward automated cyber defense,” IEEE Commun. Surveys & Tutorials, vol. 18, no. 2, pp. 1544–1571, 2016.
P. Jamshidi et al., “Machine learning meets DevOps,” IEEE Software, vol. 35, no. 5, pp. 66–75, 2018.
R. Mitchell and I.-R. Chen, “Behavior rule-based intrusion detection,” IEEE Trans. Systems, Man, and Cybernetics, vol. 42, no. 3, pp. 693–706, 2012.
S. Garcia et al., “Anomaly-based network intrusion detection,” IEEE Communications Surveys, vol. 16, no. 1, pp. 267–294, 2014.
R. Sommer and V. Paxson, “Outside the closed world,” in Proc. IEEE Symp. Security and Privacy, 2010.
D. Ardagna et al., “Cloud and data center security,” IEEE Trans. Cloud Computing, vol. 6, no. 2, pp. 317–330, 2018.
S. Pearson, Privacy, Security and Trust in Cloud Computing. Springer, 2013.
R. Krutz and R. Vines, Cloud Security. Wiley, 2010.
Red Hat, Security Hardening for Red Hat Enterprise Linux, Red Hat Documentation, 2023.
AWS, Security Best Practices for Linux Workloads, AWS Whitepaper, 2022.
IBM Security, Security and Compliance in Financial Services, IBM White Paper, 2021.
S. Han et al., “Machine learning-based configuration anomaly detection,” IEEE Access, vol. 8, pp. 145612–145624, 2020.
A. Ghaznavi et al., “Risk-aware security configuration management,” IEEE Access, vol. 7, pp. 112345–112357, 2019.
M. Almorsy et al., “Collaboration-based cloud security management,” IEEE Cloud Computing, vol. 1, no. 2, pp. 30–37, 2014.
R. Sadoddin and A. Ghorbani, “Alert correlation in intrusion detection,” IEEE Network, vol. 23, no. 1, pp. 22–28, 2009.
S. Sannareddy, “Autonomous Kubernetes cluster healing using machine learning,” Int. J. Research Publications in Eng., Technol. Manage., vol. 7, no. 5, pp. 11171–11180, 2024, doi: 10.15662/IJRPETM.2024.0705006.
M. Lyu, Software Reliability Engineering. McGraw-Hill, 1996.
J. Weiss, Industrial Cybersecurity. Momentum Press, 2010.
A. K. Sood, Cybersecurity Attacks. Academic Press, 2019.
P. Mell and T. Grance, The NIST Definition of Cloud Computing, NIST SP 800-145, 2011.
S. Checkoway et al., “Security and privacy challenges in DevOps,” in Proc. IEEE Symp. Security and Privacy, 2016.
D. Zhang et al., “AI-driven governance models for cloud compliance,” IEEE Trans. Netw. Serv. Manag., vol. 17, no. 3, pp. 1891–1904, 2020.
R. Scandariato et al., “Model-driven security governance,” IEEE Software, vol. 35, no. 2, pp. 58–65, 2018.
J. Behl and S. Behl, “Configuration drift and operational risk,” IEEE Security & Privacy, vol. 18, no. 4, pp. 72–79, 2020.
P. Shrobe et al., Cyber Security: From Principles to Practice. MIT Press, 2017.
G. Tesauro et al., “Risk-aware decision making for IT systems,” IEEE Intelligent Systems, vol. 31, no. 5, pp. 28–37, 2016.
D. Klein et al., “Predictive analytics for IT operations,” IEEE Software, vol. 36, no. 4, pp. 48–55, 2019.
S. Sannareddy, “Policy-driven infrastructure lifecycle control plane for Terraform-based multi-cloud environments,” Int. J. Eng. & Extended Technol. Res., vol. 7, no. 2, pp. 9661–9671, 2025, doi: 10.15662/IJEETR.2025.0702005.
R. Kakarla and S. Sannareddy, “AI-driven DevOps automation for CI/CD pipeline optimization,” Eastasouth J. Inf. Syst. Comput. Sci., vol. 2, no. 1, pp. 70–78, 2024, doi: 10.58812/esiscs.v2i01.849.
R. Kakarla and S. Sannareddy, “AI-driven DevSecOps automation: An intelligent framework for continuous cloud security and regulatory compliance,” J. Artificial Intelligence Research & Advances, vol. 13, no. 1, 2025.
K. R. Chirumamilla, “Predicting data contract failures using machine learning,” Eastasouth J. Inf. Syst. Comput. Sci., vol. 1, no. 1, pp. 144–155, 2023, doi: 10.58812/esiscs.v1i01.843.
K. R. Chirumamilla, “Reinforcement learning to optimize ETL pipelines,” Eastasouth J. Inf. Syst. Comput. Sci., vol. 1, no. 2, pp. 171–183, 2023, doi: 10.58812/esiscs.v1i02.844.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Balaramakrishna Alti

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.


