Agentic AI–Driven API Security and Risk Management in Cloud CI/CD Pipelines for Healthcare SAP Systems

Main Article Content

Rajesh Kumar K

Abstract

Healthcare organizations increasingly deploy SAP systems through cloud-based CI/CD pipelines to achieve agility and scalability; however, these pipelines expose critical application programming interfaces (APIs) to evolving security threats and operational risks. Traditional API security mechanisms are largely reactive and insufficient for complex, fast-paced healthcare cloud environments. This paper proposes an Agentic AI–driven approach for API security and risk management within cloud CI/CD pipelines for healthcare SAP systems. The proposed framework employs autonomous AI agents to continuously monitor API behavior, analyze deployment metadata, and apply predictive analytics to identify security vulnerabilities, compliance risks, and anomalous access patterns before production release. By embedding intelligence directly into CI/CD workflows, the model enables proactive risk mitigation, automated policy enforcement, and adaptive security responses aligned with healthcare regulatory requirements. Experimental analysis demonstrates improved threat detection accuracy, reduced security incidents, and enhanced deployment reliability when compared to conventional CI/CD security practices. The results highlight the effectiveness of agentic AI in strengthening API security, improving risk awareness, and supporting resilient SAP deployments in healthcare cloud ecosystems. 

Article Details

Section

Articles

How to Cite

Agentic AI–Driven API Security and Risk Management in Cloud CI/CD Pipelines for Healthcare SAP Systems. (2023). International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(5), 9343-9350. https://doi.org/10.15662/IJRPETM.2023.0605010

References

1. Bass, L., Clements, P., & Kazman, R. (2013). Software architecture in practice (3rd ed.). Addison-Wesley.

2. Humble, J., & Farley, D. (2010). Continuous delivery: Reliable software releases through build, test, and deployment automation. Addison-Wesley.

3. Kim, G., Debois, P., Willis, J., & Humble, J. (2016). The DevOps handbook: How to create world-class agility, reliability, and security in technology organizations. IT Revolution Press.

4. Lewis, J., & Fowler, M. (2014). Microservices: A definition of this new architectural term. Martin Fowler. https://martinfowler.com

5. Anand, L., & Neelanarayanan, V. (2019). Feature Selection for Liver Disease using Particle Swarm Optimization Algorithm. International Journal of Recent Technology and Engineering (IJRTE), 8(3), 6434-6439.

6. Navandar, P. (2022). SMART: Security Model Adversarial Risk-based Tool. International Journal of Research and Applied Innovations, 5(2), 6741-6752.

7. Fitzgerald, B., & Stol, K. J. (2017). Continuous software engineering: A roadmap and agenda. Journal of Systems and Software, 123, 176–189. https://doi.org/10.1016/j.jss.2015.06.063

8. Sudhan, S. K. H. H., & Kumar, S. S. (2016). Gallant Use of Cloud by a Novel Framework of Encrypted Biometric Authentication and Multi Level Data Protection. Indian Journal of Science and Technology, 9, 44.

9. Thambireddy, S. (2021). Enhancing Warehouse Productivity through SAP Integration with Multi-Model RF Guns. International Journal of Computer Technology and Electronics Communication, 4(6), 4297-4303.

10. Kumar, S. N. P. (2022). Machine Learning Regression Techniques for Modeling Complex Industrial Systems: A Comprehensive Summary. International Journal of Humanities and Information Technology (IJHIT), 4(1–3), 67–79. https://ijhit.info/index.php/ijhit/article/view/140/136

11. Rahman, T., Islam, M. M., Zerine, I., Pranto, M. R. H., & Akter, M. (2023). Artificial Intelligence and Business Analytics for Sustainable Tourism: Enhancing Environmental and Economic Resilience in the US Industry. Journal of Primeasia, 4(1), 1-12.

12. Vimal Raja, G. (2022). Leveraging Machine Learning for Real-Time Short-Term Snowfall Forecasting Using MultiSource Atmospheric and Terrain Data Integration. International Journal of Multidisciplinary Research in Science, Engineering and Technology, 5(8), 1336-1339.

13. Meka, S. (2022). Engineering Insurance Portals of the Future: Modernizing Core Systems for Performance and Scalability. International Journal of Computer Science and Information Technology Research, 3(1), 180-198.

14. Kruchten, P., Nord, R. L., & Ozkaya, I. (2012). Technical debt: From metaphor to theory and practice. IEEE Software, 29(6), 18–21. https://doi.org/10.1109/MS.2012.167

15. Bussu, V. R. R. (2023). Governed Lakehouse Architecture: Leveraging Databricks Unity Catalog for Scalable, Secure Data Mesh Implementation. International Journal of Engineering & Extended Technologies Research (IJEETR), 5(2), 6298-6306.

16. Paul, D. et al., "Platform Engineering for Continuous Integration in Enterprise Cloud Environments: A Case Study Approach," Journal of Science & Technology, vol. 2, no. 3, Sept. 8, (2021). https://thesciencebrigade.com/jst/article/view/382

17. Ramakrishna, S. (2023). Cloud-Native AI Platform for Real-Time Resource Optimization in Governance-Driven Project and Network Operations. International Journal of Engineering & Extended Technologies Research (IJEETR), 5(2), 6282-6291.

18. Nagarajan, G. (2022). Advanced AI–Cloud Neural Network Systems with Intelligent Caching for Predictive Analytics and Risk Mitigation in Project Management. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 5(6), 7774-7781.

19. Vengathattil, Sunish. 2021. "Interoperability in Healthcare Information Technology – An Ethics Perspective." International Journal For Multidisciplinary Research 3(3). doi: 10.36948/ijfmr.2021.v03i03.37457.

20. Buyya, R., Vecchiola, C., & Selvi, S. T. (2013). Mastering cloud computing: Foundations and applications programming. Morgan Kaufmann.

21. Sridhar Reddy Kakulavaram, Praveen Kumar Kanumarlapudi, Sudhakara Reddy Peram. (2024). Performance Metrics and Defect Rate Prediction Using Gaussian Process Regression and Multilayer Perceptron. International Journal of Information Technology and Management Information Systems (IJITMIS), 15(1), 37-53.

22. Vasugi, T. (2022). AI-Optimized Multi-Cloud Resource Management Architecture for Secure Banking and Network Environments. International Journal of Research and Applied Innovations, 5(4), 7368-7376.

23. Adari, V. K. (2020). Intelligent Care at Scale AI-Powered Operations Transforming Hospital Efficiency. International Journal of Engineering & Extended Technologies Research (IJEETR), 2(3), 1240-1249.

24. Rajurkar, P. (2020). Predictive Analytics for Reducing Title V Deviations in Chemical Manufacturing. International Journal of Technology, Management and Humanities, 6(01-02), 7-18.

25. Archana, R., & Anand, L. (2023, May). Effective Methods to Detect Liver Cancer Using CNN and Deep Learning Algorithms. In 2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (pp. 1-7). IEEE.

26. Kumar, S. N. P. (2022). Text Classification: A Comprehensive Survey of Methods, Applications, and Future Directions. International Journal of Technology, Management and Humanities, 8(3), 39–49. https://ijtmh.com/index.php/ijtmh/article/view/227/222

27. Sivaraju, P. S. (2022). Enterprise-Scale Data Center Migration and Consolidation: Private Bank's Strategic Transition to HP Infrastructure. International Journal of Computer Technology and Electronics Communication, 5(6), 6123-6134.

28. Shostack, A. (2014). Threat modeling: Designing for security. Wiley.

29. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian journal of science and technology, 8(35), 1-5.

30. Stallings, W., & Brown, L. (2018). Computer security: Principles and practice (4th ed.). Pearson.