Alti, Balaramakrishna
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Continuous Security Validation of Linux Systems Using Configuration-as-Code Alti, Balaramakrishna
The Eastasouth Journal of Information System and Computer Science Vol. 1 No. 02 (2023): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v1i02.863

Abstract

Enterprise Linux systems form the foundation of critical business services across on-premises, hybrid, and cloud infrastructures. Maintaining a secure configuration posture over time remains a persistent challenge due to manual changes, emergency fixes, and inconsistent enforcement of security standards. Traditional security validation approaches rely on periodic audits and reactive assessments, which fail to detect configuration drift in a timely manner. This paper presents a continuous security validation approach for Linux systems using configuration-as-code principles. The proposed approach encodes security controls, compliance requirements, and system hardening rules as declarative configurations that are continuously evaluated against live system state. By integrating configuration-as-code with automated validation and remediation workflows, the approach enables near real-time detection of security deviations and consistent enforcement of approved baselines. A controlled experimental evaluation conducted on a representative Linux environment demonstrates improved security posture consistency, reduced configuration drift duration, and faster remediation compared to traditional audit-based validation methods. The results show that continuous security validation using configuration-as-code provides a scalable and auditable mechanism for maintaining secure Linux system configurations.
Systematic Enforcement of CIS-Aligned Security Controls for Kubernetes Worker Nodes Alti, Balaramakrishna
The Eastasouth Journal of Information System and Computer Science Vol. 1 No. 01 (2023): The Eastasouth Journal of Information System and Computer Science (ESISCS)
Publisher : Eastasouth Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/esiscs.v1i01.864

Abstract

Securing Kubernetes worker nodes remains a persistent challenge in enterprise environments due to configuration drift, inconsistent operating system hardening, and limited visibility into runtime security posture. While the Center for Internet Security (CIS) provides benchmark recommendations for Kubernetes and Linux systems, manual enforcement of these controls is error-prone and difficult to sustain at scale. This paper presents an automated approach for hardening Kubernetes worker nodes by integrating CIS benchmark compliance with Linux security controls using configuration management automation. The proposed framework focuses on repeatable enforcement, continuous compliance validation, and operational stability. We describe the system architecture, control mapping strategy, and automation workflow, and evaluate its impact on configuration compliance and operational availability in a controlled Kubernetes environment. Results demonstrate measurable improvements in benchmark compliance while maintaining cluster stability, highlighting the feasibility of automation-driven security hardening for Kubernetes worker nodes.