Home
World Journal of Advanced Engineering Technology and Sciences
International, Peer reviewed, Referred, Open access | ISSN Approved Journal

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • WJAETS CrossMark Policy
    • Publication Ethics
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

ISSN: 2582-8266 (Online)  || UGC Compliant Journal || Google Indexed || Impact Factor: 9.48 || Crossref DOI

Fast Publication within 2 days || Low Article Processing charges || Peer reviewed and Referred Journal

Research and review articles are invited for publication in Volume 18, Issue 2 (February 2026).... Submit articles

Enhancing CI/CD security with provenance metadata and supply chain best practices

Breadcrumb

  • Home
  • Enhancing CI/CD security with provenance metadata and supply chain best practices

Devashish Ghanshyambhai Patel *

Texas A and M University-Kingsville, Texas, USA.

Review Article

World Journal of Advanced Engineering Technology and Sciences, 2025, 16(01), 019–032

Article DOI: 10.30574/wjaets.2025.16.1.1181

DOI url: https://doi.org/10.30574/wjaets.2025.16.1.1181

Received on 23 May 2025; revised on 26 June 2025; accepted on 30 June 2025

Continuous Integration and Continuous Delivery (CI/CD) pipelines have transformed modern software development by enabling faster release cycles, increased collaboration, and improved automation. However, these benefits also introduce complex security challenges, particularly within software supply chains. As the sophistication of cyber threats evolves, adversaries are increasingly targeting CI/CD environments to infiltrate trusted software delivery processes. This journal article presents a comprehensive exploration of how integrating provenance metadata and adopting supply chain security best practices can mitigate these risks. Through analysis of recent cyber incidents, industry-standard frameworks, and detailed technical implementations, this paper outlines a practical and scalable approach for securing CI/CD pipelines. It emphasizes the role of transparency, traceability, and verification in building resilient DevOps workflows and provides actionable recommendations for both practitioners and researchers.

CI/CD Security; Software Supply Chain; Provenance Metadata; Zero-Trust Architecture

https://wjaets.com/sites/default/files/fulltext_pdf/WJAETS-2025-1181.pdf

Preview Article PDF

Devashish Ghanshyambhai Patel. Enhancing CI/CD security with provenance metadata and supply chain best practices. World Journal of Advanced Engineering Technology and Sciences, 2025, 16(01), 019-032. Article DOI: https://doi.org/10.30574/wjaets.2025.16.1.1181.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content


Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


Copyright © 2026 World Journal of Advanced Engineering Technology and Sciences

Developed & Designed by VS Infosolution