HomeIsabela State University Linker: Journal of Engineering, Computing and Technologyvol. 2 no. 2 (2025)

Securing Autonomous Intelligent Automation Through Development, Security, and Operations Framework (DevSecOps) and Cloud-Native Serverless Architecture

Jessa A. Revilla-Dave | Joe G. Lagarteja

Discipline: Computer Science

 

Abstract:

With rapidly evolving technology, implementing a secure and efficient way to develop an automation process has become a critical aspect for any organization’s success. With the current state of the technology, a traditional development methodology sometimes falls short in addressing the threats and rapidly changing business requirements. This research explored the implementation of Autonomous Intelligent Automation through the development, security, and operations framework and cloud-native serverless architecture. It aimed to improve the efficiency, accuracy, and scalability of an organization by streamlining the business processes that are time-consuming, repetitive, and voluminous, and leveraging and combining cutting-edge technologies and methodologies in software development. This research used one of the processes currently existing in Isabela State University-Main Campus as a pioneer process to implement Autonomous Intelligent Automation and validate its effectiveness in terms of efficiency, accuracy, and scalability. Autonomous Intelligent Automation is a way to eliminate human error in a process. By means of intelligently mimicking what the end user does to accomplish a task, it results in a quality service that is efficient, accurate, and scalable. Implementing DevSecOps is an approach to combine and integrate the Development (Dev), Security (Sec), and Operations (Ops) to impose security in all phases of development cycle.



References:

  1. AeoLogic. (2024). Reducing operational costs with intelligent process automation. https://www.aeologic.com/blog/reducing-operational-costs-with-intelligent-process-automation/ 
  2. Akinnagbe, O. B. (2024). Human–AI collaboration: Enhancing productivity and decision-making. International Journal of Education, Management, and Technology, 2(3), 387-417. https://doi.org/10.58578/IJEMT.v2i3.4209
  3. Allen, B., & Edmundson, C. (2023). SANS 2023 DevSecOps survey. SANS Institute. https://www.sonatype.com/hubfs/Survey_DevSecOps_2023.pdf
  4. Amazon Web Services. (2025). What is Amazon CloudWatch? https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/WhatIsCloudWatch.html
  5. Bell, E., Harley, B., & Bryman, A. (2022). Business research methods (6th ed.). Oxford University Press. https://global.oup.com/ukhe/product/business-research-methods-9780198869443
  6. Benavides, L. M. C., Tamayo Arias, J. A., Arango Serna, M. D., Branch Bedoya, J. W., & Burgos, D. (2020). Digital transformation in higher education institutions: A systematic literature review. Sensors, 20(11), Article 3291. https://doi.org/10.3390/s20113291
  7. Cloud Security Alliance. (2022). Top threats to cloud computing: The pandemic eleven report. https://cloudsecurityalliance.org/artifacts/top-threats-tocloud-computing-pandemic-eleven/
  8. Dutta, A. H., & J, B. (2024). Impact of serverless computing on scalability and cost-effectiveness in cloud-based applications. International Journal of Research Publication and Reviews, 5(3), 1824–1830. https://doi.org/10.55248/gengpi.5.0324.0869
  9. Gartner Peer Community. (2023). DevSecOps: Strategies, organizational benefits, and challenges. https://www.gartner.com/peer-community/oneminuteinsights/omi-devsecops-strategies-organizational-benefits-challenges-xrd
  10. Humphreys, A. R. (2023). How AI is driving modern higher education administration. Van Allen Strategies. https://vanallenstrategies.com/insights/how-ai-is-driving-modern-higher-education-administration/
  11. IBM Security. (2025). Cost of a data breach report 2025. https://www.ibm.com/reports/data-breach
  12. Kayanja, W., Kyambade, M., & Kiggundu, T. (2025). Exploring digital transformation in higher education setting: The shift to fully automated and paperless systems. Information & Communications Technology in Education, 12(1), 1-15. https://doi.org/10.1080/2331186X.2025.2489800
  13. Kitsantas, T., Georgoulas, P., & Chytis, E. (2024). Integrating robotic process automation with artificial intelligence for business process automation: Analysis, applications, and limitations. Journal of System and Management Sciences, 14(7), 217–242. https://doi.org/10.33168/jsms.2024.0712
  14. Microsoft. (2025). What is DevSecOps? Microsoft Security. https://www.microsoft.com/en-us/security/business/security-101/what-is-devsecops
  15. Ng, K. K. H., Chen, C.-H., Lee, C. K. M., Jiao, J. R., & Yang, Z. (2021). A systematic literature review on intelligent automation: Aligning concepts from theory, practice, and future perspectives. Advanced Engineering Informatics, 47, Article 101246. https://doi.org/10.1016/j.aei.2021.101246
  16. Nielsen, I., Piyatilake, A., Thibbotuwawa, A., De Silva, M. M., Bocewicz, G., & Banaszak, Z. (2023). Benefits realization of robotic process automation (RPA) initiatives in supply chains. IEEE Access, 11, 1–15. https://doi.org/10.1109/ACCESS.2023.3266293
  17. Othman, A. (2025). The foundations and challenges of AI ethics. Asia e University. https://doi.org/10.13140/RG.2.2.31556.13444
  18. Pan, M., Wang, J., & Wang, J. (2023). Application of artificial intelligence in education: Opportunities, challenges, and suggestions. In Proceedings of the International Conference on Information Technology in Medicine and Education (pp. 623–627). IEEE. https://doi.org/10.1109/ITME60234.2023.00130
  19. Qin, H., & Wang, G. (2022). Benefits, challenges and solutions of artificial intelligence applied in education. In Proceedings of the 11th International Conference on Educational and Information Technology (ICEIT) (pp. 62–66). IEEE. https://doi.org/10.1109/iceit54416.2022.9690739
  20. Rao, V. (2024, April 25). AI will supercharge RPA. LinkedIn. https://www.linkedin.com/pulse/ai-supercharge-rpa-vasu-rao-zvlic
  21. Saleh, S. M., Madhavji, N., & Steinbacher, J. (2025). A systematic literature review on continuous integration and deployment (CI/CD) for secure cloud computing. arXiv. https://doi.org/10.48550/arXiv.2506.08055
  22. Shin, H., Ko, J., & Lee, J. (2020). LogCleaner: Noise-aware log preprocessing to enhance operational log analysis. IEEE Transactions on Software Engineering, 46(3), 234–250.
  23. Szeliski, R. (2022). Computer vision: Algorithms and applications. Springer Nature Switzerland. https://doi.org/10.1007/978-3-030-34372-9
  24. Ta, P. B., Trần, M.-N., & Kim, Y. (2022). Serverless computing approach for deploying machine learning applications in edge layer. In Proceedings of the International Conference on Information Networking (ICOIN) (pp. 396–401). IEEE. https://doi.org/10.1109/ICOIN53446.2022.9687209.
  25. Tan, P. A. (2024). Optical character recognition (OCR) with CNN-LSTM attention seq2seq. Towards AI. https://towardsai.net/p/artificial-intelligence/optical-character-recognition-ocr-with-cnn-lstm-attention-seq2seq