<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Research on Policy-as-Code for Implementation of Role- based and Attribute-based Access Control⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Vakhula</string-name>
          <email>oleksandr.p.vakhula@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ivan Opirskyy</string-name>
          <email>ivan.r.opirskyi@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pavlo Vorobets</string-name>
          <email>pavlo.a.vorobets@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Orest Bobko</string-name>
          <email>orest.bobko.mkbas.2024@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleh Kulinich</string-name>
          <email>o.kulinich@nubip.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>12 Stepan Bandera str., 79000 Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National University of Life and Environmental Sciences of Ukraine</institution>
          ,
          <addr-line>19/1 Horikhuvatskyi Shliakh str., 03041 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>139</fpage>
      <lpage>157</lpage>
      <abstract>
        <p>The growing adoption of cloud-native and microservices architectures has revolutionized how organizations deploy and manage applications, bringing enhanced scalability, agility, and speed. However, these advancements also introduce significant challenges in managing access control in dynamic, distributed environments. Traditional access control models like Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) are foundational to securing sensitive resources but often struggle to scale and adapt to the complex, rapidly evolving demands of cloud infrastructures. RBAC systems face issues such as “role explosion”, while ABAC systems can become unmanageable due to the increasing complexity of attribute combinations. These challenges necessitate innovative solutions for consistent, scalable, and automated access control management. Policy-as-Code (PaC) has emerged as a transformative approach to address these challenges by codifying access control policies, enabling automation, scalability, and real-time adaptability. PaC integrates seamlessly into modern DevOps practices, allowing RBAC and ABAC policies to be managed, tested, and enforced as code within CI/CD pipelines. This approach ensures consistent policy enforcement across diverse environments, improves transparency and auditability through version control, and facilitates compliance with regulatory standards like GDPR, HIPAA, and PCI DSS. Tools such as Open Policy Agent (OPA) and HashiCorp Sentinel play pivotal roles in implementing PaC, providing granular control and automation for complex policy requirements. This research explores the integration of PaC with RBAC and ABAC in cloud-native infrastructures, addressing key challenges such as scalability, compliance, and cross-cloud interoperability. It includes a comprehensive review of recent literature, practical implementation guides, and real-world case studies demonstrating the application of PaC for automated access control. The findings highlight how organizations can achieve continuous compliance, operational efficiency, and enhanced security by adopting PaC. For instance, the study outlines strategies for reducing operational overhead through automated policy validation and enforcement, mitigating risks of misconfigurations, and ensuring dynamic, context-aware access control. The research also identifies challenges associated with PaC adoption, including initial setup complexity, performance overhead in attribute-heavy environments, and managing policy sprawl in large-scale systems. It proposes future research directions, such as leveraging AI for adaptive policy optimization, enhancing real-time policy evaluation, and developing unified frameworks for multi-cloud environments. In conclusion, this study establishes PaC as a robust framework for implementing scalable and adaptive RBAC and ABAC in cloud-native and multicloud environments. By automating policy management and integrating access control into the software development lifecycle, PaC empowers organizations to meet the demands of modern infrastructures while ensuring security, compliance, and operational agility. This work provides actionable insights for practitioners and researchers seeking to leverage PaC for effective access control management.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;policy-as-code</kwd>
        <kwd>PaC</kwd>
        <kwd>role-based access control</kwd>
        <kwd>attribute-based access control</kwd>
        <kwd>Kubernetes</kwd>
        <kwd>continuous integration</kwd>
        <kwd>continuous development</kwd>
        <kwd>security-as-code</kwd>
        <kwd>open policy agent</kwd>
        <kwd>gatekeeper</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Organizations are increasingly adopting cloud-native and microservices architectures to enhance
scalability, agility, and speed of deployment. However, as these environments
growmailto:orest.bobko.mkbas.2024@lpnu.ua, the challenge of managing and enforcing access
control becomes more complex. Established access control models, such as RBAC and ABAC,
remain crucial for ensuring that sensitive resources are accessible only to authorized users and
services.</p>
      <p>Yet, implementing these models in distributed, dynamic infrastructures poses significant
challenges, particularly in terms of scalability, granularity, and adaptability.</p>
      <p>RBAC has long been the foundation of access control, assigning permissions based on
predefined roles. However, in large-scale, distributed environments, the sheer volume of users,
roles, and permissions can overwhelm conventional RBAC systems. Meanwhile, ABAC introduces
a more granular approach, allowing access decisions based on user attributes, resource attributes,
and environmental factors. While ABAC provides flexibility, it also increases complexity, as access
policies must account for a wide range of attributes and conditions.</p>
      <p>To address these challenges, PaC has emerged as a transformative approach, enabling the
automation and codification of access control policies within development pipelines. PaC allows
RBAC and ABAC policies to be defined, enforced, and managed as code, providing consistent,
scalable, and adaptive access control across cloud environments. Through PaC, organizations can
implement access control policies that are versioned, tested, and deployed alongside application
code, ensuring alignment with changing application requirements and compliance standards.</p>
      <p>
        In addition to enabling automation, PaC facilitates continuous compliance and auditability. By
maintaining a versioned history of policy changes, organizations can ensure that access control
decisions are transparent, traceable, and easy to review for compliance with regulations such as
GDPR [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], HIPAA [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], and PCI DSS [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Tools like Open Policy Agent (OPA) and HashiCorp
Sentinel have become popular for implementing PaC, offering the flexibility to enforce both RBAC
and ABAC in dynamic environments.
      </p>
      <p>This research aims to explore how PaC can streamline and strengthen access control in
distributed environments, with a specific focus on RBAC and ABAC implementations. The paper
will investigate the key challenges in applying these access control models within cloud-native
infrastructures, evaluate the benefits of using PaC to manage and enforce these policies and
provide a practical implementation guide using tools like OPA and Sentinel. By examining
realworld case studies and assessing the limitations and advantages of PaC, this research seeks to
establish a framework for implementing scalable, compliant, and adaptive access control through
PaC.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature and recent research review</title>
      <p>
        The fast shift toward cloud-native environments has brought increased attention to the scalability
and flexibility of access control models. PaC is now widely discussed in the literature as an
innovative solution for implementing complex access control policies in distributed systems [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ].
This section provides an overview of foundational research and recent and older studies, that
explore PaC, RBAC, and ABAC.
      </p>
      <p>
        PaC emerged from the DevOps and Infrastructure-as-Code (IaC) paradigms, which advocate for
the codification of infrastructure and configurations to enable versioning, automated testing, and
consistent deployments [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>PaC extends these principles to security and access control, allowing policies to be codified,
tested, and managed as part of the software lifecycle. PaC has since gained popularity as a method
for defining and enforcing security controls across distributed environments, particularly for
organizations adopting microservices and serverless architectures.</p>
      <p>
        RBAC was formally introduced in the 1990’s as a solution to simplify access management by
assigning permissions based on user roles [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. RBAC has since been widely adopted in enterprise
environments due to its simplicity and ease of implementation. However, recent studies point out
limitations in scalability and flexibility when applied to dynamic, cloud-native environments.
      </p>
      <p>
        ABAC, on the other hand, offers a more flexible approach by basing access decisions on a set of
attributes related to the user, resource, and environment [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>The integration of PaC with RBAC and ABAC models offers promising solutions to address the
challenges associated with access control in cloud-native environments. Open Policy Agent (OPA)
has become a leading tool in this area, providing a declarative language, Rego, for defining PaC.</p>
      <p>
        Moreover, Gartner Research identifies PaC as a critical component for achieving continuous
compliance, especially for organizations operating in regulated industries. Their report suggests
that by integrating PaC with identity and access management (IAM) solutions, organizations can
achieve a unified and automated approach to compliance that reduces the risk of human error and
regulatory violations [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        While the benefits of PaC for implementing RBAC and ABAC are well-documented, researchers
have identified several limitations and problems. Languages that can simplify the management of
attribute-based policies in large-scale environments can have some weaknesses. The paper on the
Tenable blog highlights vulnerabilities associated with domain-specific languages (DSLs), using
Open Policy Agent (OPA) as a case study, and explores how attackers can exploit poorly
implemented policies or misconfigurations in these systems [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>Future research should focus on developing adaptive PaC frameworks that can dynamically
adjust policies based on changing contextual factors, such as user behavior or network conditions.
Additionally, the integration of machine learning techniques with PaC holds promise for
automatically detecting and mitigating potential policy misconfigurations or security threats, an
area that is still underexplored.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Challenges in Implementing RBAC and ABAC in dynamic environments</title>
      <p>
        In distributed, cloud-native, and microservices architectures, managing access control presents a
complex set of challenges. RBAC and ABAC have been widely adopted to ensure that users can
access only the resources they are authorized to use. However, when applied to dynamic and
largescale environments, traditional implementations of RBAC and ABAC face several significant
limitations [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <sec id="sec-3-1">
        <title>3.1. Scalability and complexity</title>
        <p>
</p>
        <p>
          RBAC Complexity in Large-Scale Systems: As organizations grow, the number of roles
and permissions required to control access can become overwhelming. In dynamic
environments, where services, users, and resources frequently change, managing a vast set
of static roles can lead to a “role explosion.” This situation occurs when the system requires
an excessive number of roles to accommodate diverse and evolving access needs. For
example, in large organizations, a single user might belong to multiple departments,
projects, or teams, each with distinct access requirements [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
        <p>
          ABAC Attribute Management: ABAC is designed for flexibility, allowing access based on
a combination of attributes such as user role, location, time, and device type. However, as
attribute-based policies grow more complex, they can become difficult to manage. The
number of potential combinations of attributes can quickly escalate, making it challenging
to track, update, and validate all possible policies. This complexity can lead to
administrative overhead and increased risk of misconfiguration, especially in highly
dynamic environments like microservices architectures [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Dynamic policy requirements</title>
        <p></p>
        <p>Frequent Policy Changes: Cloud-native environments are highly dynamic, with frequent
changes in user roles, application states, and resource configurations. In such
environments, access policies must be regularly updated to reflect current conditions.
Traditional RBAC systems, which rely on static roles and permissions, struggle to adapt to
these changes without significant manual intervention. ABAC is more adaptable, but
managing attribute changes manually across distributed services is both time-consuming
and error-prone.</p>
        <p>Context-Aware Policies: Dynamic environments often require context-aware policies
that adapt based on real-time factors, such as a user’s location, device, or time of access. For
example, an ABAC policy may allow access to sensitive data only if the request is made
within a specific network range or during certain hours. Managing these conditional
policies at scale is challenging, as it requires continuous monitoring of contextual factors
and prompt enforcement of access rules based on changes in the environment.</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Auditability and compliance</title>
        <p>Lack of Policy Transparency: Ensuring compliance with industry standards and
regulatory requirements, such as GDPR, HIPAA, or PCI DSS, demands a high level of
transparency in access control policies. Traditional RBAC and ABAC implementations may
not provide adequate visibility into policy changes, making it difficult to demonstrate
compliance or to perform audits. PaC offers some relief by enabling version control and
audit trails for policy changes, but implementing this at scale remains complex.
Audit and Reporting Overhead: In distributed systems, access control policies often need
to be enforced across multiple services and locations, each with its own logging and
auditing mechanisms. Gathering and consolidating these logs to produce a unified access
report is challenging. The lack of centralized visibility can make it difficult to identify
unauthorized access or policy violations, increasing the risk of non-compliance with
regulations and standards. Implementing a comprehensive audit trail requires additional
resources and tools, which can be costly and time-consuming.</p>
      </sec>
      <sec id="sec-3-4">
        <title>3.4. Performance and resource constraints</title>
        <p>
</p>
        <p>Latency in Policy Enforcement: Dynamic environments require that access policies be
enforced in real-time. However, implementing complex RBAC and ABAC policies across
distributed systems can introduce latency, especially when policy evaluation involves
numerous attributes or complex conditional logic. This latency can impact the user
experience or slow down application performance, which is a significant concern for
highdemand environments.</p>
        <p>Resource Consumption: The enforcement of attribute-based policies, particularly those
with context-aware conditions, requires continuous monitoring of environmental factors
and frequent evaluation of access rules. This can consume significant computational
resources, especially in large-scale environments where multiple attributes must be
evaluated for each access request. High resource consumption not only affects performance
but also increases operational costs, making it challenging to implement ABAC effectively
in cost-sensitive environments.</p>
      </sec>
      <sec id="sec-3-5">
        <title>3.5. Complexity of cross-platform and multi-cloud environments</title>
        <p></p>
        <p>Inconsistent Policy Management: Organizations often use multiple cloud providers and
platforms to meet their business needs. Implementing RBAC and ABAC across these
platforms introduces complexity, as each provider may have different access control
mechanisms, policy languages, and enforcement strategies. Coordinating policies across
platforms can lead to inconsistencies, where policies are properly enforced on one platform
but not on others.</p>
        <p>Interoperability Challenges: In multi-cloud or hybrid cloud environments, ensuring that
access control policies work seamlessly across different platforms is a significant challenge.
For instance, a policy defined in one cloud provider’s format may not be directly
translatable to another provider’s system. The lack of interoperability between platforms
can make it difficult to implement consistent RBAC or ABAC policies, increasing the risk of
unauthorized access or inconsistent policy enforcement.</p>
        <p>
          Implementing RBAC and ABAC in dynamic environments is a complex task that requires
addressing scalability, adaptability, and transparency issues, among others. PaC offers promising
solutions to many of these challenges by allowing policies to be codified, versioned, and deployed
across distributed systems in an automated and consistent manner. However, as discussed, the
effective integration of PaC with RBAC and ABAC models remains a challenge in dynamic,
multicloud environments. The next sections of this paper will explore how PaC can help overcome these
challenges, providing an adaptable and scalable approach to access control in modern
infrastructures [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Policy-as-code for RBAC and ABAC</title>
      <p>
        PaC enables organizations to define, manage, and enforce access control policies in a code-based
format, offering consistency, scalability, and automation in modern infrastructures [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. When
applied to RBAC and ABAC, PaC brings automation and flexibility to these traditional access
models, addressing many of the challenges associated with managing access in dynamic,
distributed environments. This section explores how PaC transforms RBAC and ABAC into more
adaptable and manageable models and discusses the primary benefits of this approach.
      </p>
      <sec id="sec-4-1">
        <title>4.1. Automated policy enforcement</title>
        <p>Consistency Across Environments: In distributed and multi-cloud environments,
maintaining consistent access control policies can be difficult. By defining RBAC and ABAC
policies as code, PaC enables organizations to apply the same policies across diverse
environments, ensuring that access controls are consistently enforced. This automation also
reduces the risk of discrepancies or misconfigurations between environments, a common
issue in large-scale deployments.</p>
        <p>
          Continuous Policy Enforcement: PaC integrates with CI/CD pipelines, ensuring that
access policies are continuously validated and deployed alongside application code. Any
changes to access control policies can be tested and enforced automatically, providing
realtime policy updates without manual intervention. This continuous enforcement is
especially beneficial for ABAC, where contextual attributes may change frequently,
requiring policies to adapt dynamically [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Policy versioning and change management</title>
        <p>


</p>
        <p>Version Control for Policies: Storing RBAC and ABAC policies as code allows them to be
managed in version control systems (e.g., Git), enabling teams to track and audit changes
over time. Versioning provides a historical record of policy updates, allowing organizations
to roll back to previous policy states if needed. This capability is crucial for compliance, as
it ensures that organizations can document access control changes and demonstrate
adherence to regulatory requirements.</p>
        <p>Collaborative Change Management: With PaC, policy updates follow the same
processes as software development, including code review and testing. This enables
collaborative change management, where security teams, developers, and DevOps teams
can work together to define and refine access policies. Through this approach,
organizations can ensure that policies are well-tested and approved before being deployed,
reducing the risk of unintended access control changes.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Tools for policy-as-code in RBAC and ABAC</title>
        <p>
          Open Policy Agent (OPA): OPA is a popular open-source tool for defining and enforcing
policies in cloud-native environments. Using its declarative policy language, Rego, OPA
enables organizations to write RBAC and ABAC policies as code, which can be integrated
across various services (e.g., Kubernetes, CI/CD pipelines). OPA’s flexibility makes it
suitable for both RBAC and ABAC, allowing fine-grained control over access decisions
based on user roles and attributes [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ].
        </p>
        <p>
          HashiCorp Sentinel: HashiCorp Sentinel is a policy as code framework designed to
enforce policies in HashiCorp’s suite of products, such as Terraform and Vault. Sentinel
supports both RBAC and ABAC implementations, making it ideal for organizations using
HashiCorp’s ecosystem. Sentinel enables administrators to define access control policies in
a code-based format, which can be applied across infrastructure resources, providing
consistent and automated access control [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ].
        </p>
        <p>
          AWS IAM Policies: For organizations using AWS, Identity and Access Management (IAM)
offers built-in support for PaC through JSON-based policy documents. These policies can be
defined for both RBAC and ABAC models, allowing administrators to set role- and
attribute-based permissions for users and services within AWS. IAM policies integrate well
with AWS’s ecosystem and provide a straightforward way to enforce access control in
cloud-native applications [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ].





        </p>
        <p>Auditable Policy History: PaC enables organizations to maintain a comprehensive record
of policy changes, which is essential for demonstrating compliance with regulatory
standards. By version-controlling access policies, organizations can provide auditors with a
traceable history of policy updates, showing how access decisions were made over time.
This level of transparency is beneficial for meeting compliance requirements, especially in
regulated industries like finance and healthcare.</p>
        <p>
          Automated Compliance Checks: PaC facilitates automated compliance validation, where
policies are continuously checked against regulatory standards. By integrating compliance
checks into CI/CD pipelines, organizations can ensure that their RBAC and ABAC policies
meet industry standards before deployment. For example, policies can be validated to
confirm that access restrictions align with GDPR, HIPAA, PCI DSS, or ISO 27001
requirements, reducing the risk of non-compliance [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Policy validation and testing</title>
        <p>
</p>
        <sec id="sec-4-4-1">
          <title>Automated Policy Testing in CI/CD Pipelines: One of the key benefits of PaC is the</title>
          <p>
            ability to test access policies as part of CI/CD workflows. By embedding policy tests in the
pipeline, organizations can validate that RBAC and ABAC policies are configured correctly
before deployment. For example, policies can be tested to ensure that only authorized users
have access to specific resources or that attribute-based conditions are applied correctly
[
            <xref ref-type="bibr" rid="ref20">20</xref>
            ].
          </p>
          <p>Policy Simulation and Validation: Tools like OPA offer simulation capabilities that
allow administrators to test policies in a sandbox environment. This feature is particularly
useful for ABAC, where policies can be complex due to the combination of multiple
attributes. By simulating policies before they are applied, organizations can verify that
access controls work as intended, reducing the risk of misconfigurations.</p>
        </sec>
      </sec>
      <sec id="sec-4-5">
        <title>4.5. Compliance and auditability</title>
      </sec>
      <sec id="sec-4-6">
        <title>4.6. Real-time policy enforcement and adaptability</title>
        <p>
</p>
        <p>Dynamic Policy Adaptation: In environments where user roles or attributes frequently
change, PaC enables real-time policy adaptation to ensure that access controls remain
relevant. For ABAC, which depends on attributes like user location, device type, or time of
day, PaC provides the flexibility to enforce policies based on current conditions. This
realtime adaptability reduces the administrative burden of manually updating policies in
response to changing conditions.</p>
        <p>Proactive Incident Response: PaC allows organizations to enforce security policies
proactively, triggering incident response protocols when policy violations occur. For
example, if an ABAC policy detects an access attempt from an unauthorized location, the
system can automatically revoke access or alert the security team. This proactive
enforcement strengthens security by enabling rapid responses to potential threats.</p>
        <p>
          PaC transforms RBAC and ABAC from static, manually managed models into flexible,
automated systems capable of adapting to dynamic, cloud-native environments. By enabling
versioning, testing, and real-time enforcement, PaC addresses many of the scalability and
compliance challenges inherent in traditional access control implementations. The integration of
tools like Open Policy Agent, HashiCorp Sentinel, and AWS IAM further enhances the ability to
manage and enforce access control policies as code, bringing consistency, auditability, and
scalability to access control in distributed environments [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Case studies and tools</title>
      <p>This section presents real-world examples of implementing PaC for RBAC and ABAC using leading
tools. Each case study provides technical insights into how PaC helps automate, enforce, and
manage access control policies within dynamic environments. Additionally, we explore specific
tools such as Open Policy Agent (OPA), HashiCorp Sentinel, and AWS IAM, detailing their setup
and configurations for RBAC and ABAC.</p>
      <sec id="sec-5-1">
        <title>5.1. Case study 1: RBAC implementation in Kubernetes with open policy agent</title>
        <p>Context: A financial services organization deployed a multi-tenant Kubernetes
environment to support microservices. They needed a secure and scalable way to enforce
RBAC policies, ensuring that each service could only access resources within its designated
namespace.</p>
        <p>Challenge: Kubernetes’s native RBAC lacked the granularity required for fine-tuned role
management across tenants. Additionally, managing roles at scale for hundreds of services
presented a risk of misconfiguration and permission sprawl.</p>
        <p>Solution: The organization integrated Open Policy Agent (OPA) with Kubernetes,
defining policies using the Rego language to enforce role-based permissions on resources
within each namespace.



</p>
        <sec id="sec-5-1-1">
          <title>Technical Details:</title>
          <p>Policy Definition: RBAC policies were written in OPA’s Rego language. Each policy was
stored as code in a Git repository and managed through CI/CD pipelines.</p>
          <p>Sample Rego Policy:
package kubernetes.authz
allow {
input.user.roles[_] == "dev-role"
input.resource.namespace == "development"
input.verb == "get"
input.resource.kind == "pod"</p>
          <p>This policy allows users with the dev-role to perform get operations on pod resources within
the development namespace.</p>
          <p>
            OPA Integration with Kubernetes: OPA was deployed as an admission controller,
intercepting requests to the Kubernetes API server. When a request was made, OPA
evaluated the Rego policies and allowed or denied access based on the defined RBAC rules
[
            <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
            ].
          </p>
          <p>Automated Testing and Validation: Policy changes were version-controlled, with
automated tests in CI/CD to validate access rules before deployment. This setup allowed the
organization to detect and fix policy misconfigurations before applying them to the live
environment.</p>
        </sec>
      </sec>
      <sec id="sec-5-2">
        <title>5.2. Case study 2: ABAC implementation for data access control with HashiCorp</title>
      </sec>
      <sec id="sec-5-3">
        <title>Sentinel</title>
        <p>Context: A healthcare provider requires ABAC to secure patient data based on user
attributes, such as job role, department, and access time. This setup ensured that only
authorized healthcare personnel could view sensitive information under specific conditions.
Challenge: Ensuring fine-grained control over data access in a multi-cloud environment,
while enabling real-time access adjustments based on changing attributes (e.g., location).
Solution: The organization used HashiCorp Sentinel within their IaC setup, managing
access control for data stored in AWS S3 and GCP buckets.</p>
        <sec id="sec-5-3-1">
          <title>Technical Details:</title>
          <p>Policy Definition: Sentinel policies were written to define conditions for accessing
sensitive resources based on user attributes. For example, access to patient records was
restricted to healthcare professionals during their shift hours and only within designated
facilities.</p>
          <p>Sample Sentinel Policy:
import "strings"
main = rule {
// Allow access if the requestor's job role includes "nurse" or "doctor"
strings.contains(requestor.job_role, "nurse") or
strings.contains(requestor.job_role, "doctor")
// Restrict access to specific IP ranges for hospital facilities
and requestor.ip_address in ["10.0.0.0/24", "10.1.0.0/24"]
// Ensure access during working hours (8am - 8pm)
and time.now.hour &gt;= 8 and time.now.hour &lt;= 20</p>
          <p>
            This policy restricts access based on role, IP address, and time, allowing healthcare personnel to
access records within working hours and specific network locations [
            <xref ref-type="bibr" rid="ref25">25</xref>
            ].
          </p>
          <p>Real-Time Enforcement: The Sentinel policy engine was integrated into the provider’s
cloud environment using HashiCorp’s Terraform for IaC, enforcing policies each time
infrastructure or IAM roles were provisioned or updated. Changes to user attributes (e.g., IP
address) triggered an automatic re-evaluation of access permissions.</p>
          <p>Logging and Auditing: Sentinel logs were stored centrally and integrated with the
healthcare provider’s logging infrastructure, providing a complete audit trail for all access
decisions based on ABAC policies.</p>
        </sec>
      </sec>
      <sec id="sec-5-4">
        <title>5.3. Case study 3: Multi-cloud ABAC for dynamic data access using AWS IAM and OPA</title>
        <p>Context: A global e-commerce company needed to secure customer data across AWS and
Azure. The organization required ABAC to restrict access based on attributes such as
department, project, and user location, with automated enforcement across both clouds.
Challenge: Coordinating access policies across multiple cloud environments while
ensuring consistency and security in data access.</p>
        <p>
          Solution: The company used AWS IAM for defining JSON-based policies for ABAC within
the AWS environment, while Open Policy Agent (OPA) managed cross-cloud access
policies. OPA acted as a centralized policy decision point for all data access requests [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ].
        </p>
        <sec id="sec-5-4-1">
          <title>Technical Details: AWS IAM Policy for ABAC:</title>
          <p>"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::customer-data/*",
"Condition": {
"StringEquals": {
"aws:PrincipalTag/department": "customer-support",
"aws:PrincipalTag/location": "us-west-2"






{
}
]
}
}</p>
          <p>This IAM policy restricts S3 access based on department and location attributes, allowing only
customer support staff in the US West region to access customer data.</p>
          <p></p>
          <p>Cross-Cloud Enforcement with OPA: OPA was deployed as a centralized policy engine
that processed ABAC policies for resources across AWS and Azure. OPA’s Rego policies
were stored in a Git repository and versioned, allowing the organization to enforce the
same access controls on both platforms.</p>
          <p>Automated Attribute Synchronization: Attributes were synchronized across clouds
using AWS Lambda functions and Azure Logic Apps, which updated user attributes in real
time to ensure consistency. This enabled OPA to evaluate access decisions based on
up-todate attribute information from both clouds.</p>
          <p>Policy Evaluation and Monitoring: OPA’s decision logs were integrated with the
company’s monitoring tools (e.g., Datadog), allowing the security team to track policy
enforcement and respond to any anomalies in access patterns.</p>
        </sec>
      </sec>
      <sec id="sec-5-5">
        <title>5.4. Tools Overview and Setup</title>
        <p>The following tools are widely used for implementing PaC in RBAC and ABAC across dynamic
environments:</p>
        <p>
          These case studies demonstrate the versatility and effectiveness of PaC for implementing RBAC
and ABAC in cloud-native environments. By leveraging tools like OPA, Sentinel, and AWS IAM,
organizations can achieve consistent, scalable, and real-time access control enforcement across
distributed systems. In the following section, we present a practical implementation guide,
detailing step-by-step instructions for applying PaC in RBAC and ABAC models [
          <xref ref-type="bibr" rid="ref27 ref28">27, 28</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Practical implementation guide</title>
      <p>Implementing PaC for RBAC and ABAC involves defining, testing, deploying, and managing
policies within an automated workflow. This section provides a step-by-step guide for setting up
PaC, including policy definition, CI/CD integration, testing, and real-time enforcement across
dynamic environments. The guide focuses on using Open Policy Agent (OPA) and HashiCorp
Sentinel as examples but can be adapted for other tools.</p>
      <p>Fig. 1 illustrates a general overview of the implementation process for PaC in validating RBAC
and ABAC policies.</p>
      <sec id="sec-6-1">
        <title>6.1. Defining and managing policies-as-code</title>
        <sec id="sec-6-1-1">
          <title>Step 1: Define Policies using Rego or Sentinel Language</title>
          <p></p>
          <p>For RBAC, start by defining roles and associated permissions in a policy file. For ABAC,
define attribute-based rules to allow or deny access based on user and resource attributes.
Example RBAC Policy in Rego (Open Policy Agent):
package kubernetes.authz
allow {
input.user.roles[_] == "admin"
input.verb == "create"
input.resource.kind == "pod"
}
This policy grants the admin role permission to create pod resources.
hours.</p>
          <p>strings.contains(requestor.department, "HR") and
time.now.hour &gt;= 9 and time.now.hour &lt;= 17</p>
        </sec>
        <sec id="sec-6-1-2">
          <title>Step 2: Version Control Policies with Git</title>
        </sec>
      </sec>
      <sec id="sec-6-2">
        <title>6.2. Integrating PaC with CI/CD pipelines</title>
        <sec id="sec-6-2-1">
          <title>Step 1: Set Up Policy Validation in CI/CD</title>
          <p></p>
          <p>
            Example ABAC Policy in Sentinel:
main = rule {
// Permit only if the requestor’s department is "HR" and the access time is within working
Store policy files in a Git repository, allowing version control for tracking changes and
enforcing review processes. Set up branching for development, testing, and production
stages to prevent accidental deployment of untested policies [
            <xref ref-type="bibr" rid="ref29">29</xref>
            ].
          </p>
          <p>Configure automated checks in your CI/CD pipeline to validate policies before deployment.
For example, add a policy validation step in GitHub Actions, GitLab CI/CD, or Jenkins.</p>
          <p>OPA Example (using opa test command):
opa test ./policies/</p>
          <p>This command runs tests on all policies within the ./policies directory. Failures will prevent the
policy from moving to the next stage.</p>
        </sec>
        <sec id="sec-6-2-2">
          <title>Step 2: Policy Testing and Simulation</title>
          <p></p>
          <p>Define unit tests for policies to verify expected behavior under various scenarios. This
includes tests for both allowed and denied actions based on specified roles or attributes.
Example Test for OPA (using Rego test files):
package kubernetes.authz
test_admin_can_create_pod {
allow with input as {
"user": {"roles": ["admin"]},
"verb": "create",
"resource": {"kind": "pod"}</p>
          <p>Sentinel Test File:
test "HR access during work hours" {
input = {
requestor = {
}
assert main</p>
        </sec>
        <sec id="sec-6-2-3">
          <title>Step 3: Automate Deployment of Policies</title>
          <p>Use CI/CD to automatically deploy validated policies to the environment. Policies can be
loaded to OPA as bundles or pushed directly to Sentinel’s policy repository.</p>
        </sec>
      </sec>
      <sec id="sec-6-3">
        <title>6.3. Configuring real-time enforcement with OPA</title>
        <sec id="sec-6-3-1">
          <title>Step 1: Deploy OPA as an Admission Controller (Kubernetes)</title>
          <p>helm install opa stable/open-policy-agent</p>
        </sec>
        <sec id="sec-6-3-2">
          <title>Step 2: Define Admission Controller Configuration</title>
          <p>In Kubernetes, OPA can be deployed as an admission controller to enforce policies in real
time. Use Helm to install OPA:
Configure OPA to intercept specific Kubernetes API calls by defining admission controller
configurations. Specify which operations to monitor, such as creating or deleting resources,
and which roles or attributes are required.</p>
          <p>Example Kubernetes Admission Controller Config:
apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration
metadata:</p>
          <p>name: opa-validation
webhooks:
- name: validation.openpolicyagent.org
clientConfig:
service:
name: opa
namespace: opa
path: "/v1/data/kubernetes/authz/allow"
rules:
- operations: ["CREATE", "UPDATE"]
apiGroups: ["*"]
apiVersions: ["*"]
resources: ["pods"]</p>
        </sec>
        <sec id="sec-6-3-3">
          <title>Step 3: Test Real-Time Policy Enforcement</title>
          <p></p>
          <p>
            Use kubectl or other clients to create resources and test the real-time application of policies.
Policies should automatically permit or deny requests based on defined rules, such as user
roles or attributes [
            <xref ref-type="bibr" rid="ref30">30</xref>
            ].
          </p>
        </sec>
      </sec>
      <sec id="sec-6-4">
        <title>6.4. Implementing sentinel for ABAC in multi-cloud</title>
        <sec id="sec-6-4-1">
          <title>Step 1: Define Sentinel Policies for ABAC</title>
          <p></p>
          <p>In multi-cloud environments, Sentinel policies can enforce ABAC based on conditions like
department, job role, or environment type. Use logical expressions to define complex ABAC
rules that account for multiple attributes.</p>
        </sec>
        <sec id="sec-6-4-2">
          <title>Step 2: Integrate Sentinel with Terraform for Infrastructure Provisioning</title>
          <p></p>
          <p>Configure Sentinel policies to run whenever Terraform resources are provisioned or
modified, ensuring that access controls are applied consistently across resources.
Example Sentinel Policy to Enforce Departmental Access:
main = rule {</p>
          <p>requestor.department == "Engineering"</p>
        </sec>
        <sec id="sec-6-4-3">
          <title>Step 3: Use Sentinel to Enforce Attribute-Based Controls Across Clouds</title>
          <p>Apply Sentinel policies across AWS and Azure environments by integrating Sentinel with
Terraform providers for each cloud. This allows organizations to enforce uniform ABAC
policies across platforms.</p>
        </sec>
      </sec>
      <sec id="sec-6-5">
        <title>6.5. Logging and auditing for compliance</title>
        <sec id="sec-6-5-1">
          <title>Step 1: Enable Centralized Logging of Policy Decisions</title>
        </sec>
        <sec id="sec-6-5-2">
          <title>Step 2: Configure Alerting for Policy Violations</title>
        </sec>
        <sec id="sec-6-5-3">
          <title>Step 3: Maintain a Versioned History of Policies</title>
          <p>Integrate OPA and Sentinel with a centralized logging solution, such as Elasticsearch or
AWS CloudWatch, to track all access requests and policy decisions. This setup provides an
auditable trail of access control decisions.</p>
          <p>Set up alerts to notify security teams of any unauthorized access attempts or policy
violations. For example, integrate OPA logs with Datadog or Prometheus to monitor access
control patterns in real-time and alert on suspicious activity.</p>
        </sec>
      </sec>
      <sec id="sec-6-6">
        <title>6.6. Best practices for PaC in RBAC and ABAC</title>
        <p>Version control all policy changes and keep records of updates. This history is essential for
auditability, allowing organizations to demonstrate how access policies evolved and to
investigate potential security incidents related to policy changes.</p>
        <sec id="sec-6-6-1">
          <title>Separate Policy Definitions for Different Environments: Keep separate policies for</title>
          <p>development, staging, and production to prevent test policies from affecting live
environments.</p>
          <p>Use Least Privilege: Design RBAC and ABAC policies based on the principle of least
privilege, granting the minimum necessary access required by roles or attributes.

</p>
          <p>Automate Policy Updates: Establish a CI/CD pipeline to automate policy validation and
deployment. This automation minimizes manual errors and enforces consistent security
controls across environments.</p>
          <p>Regularly Test Policies: Schedule regular policy tests and simulations to ensure that
RBAC and ABAC controls remain effective as environments and access requirements
change over time.</p>
          <p>
            Implementing PaC for RBAC and ABAC allows organizations to manage access control in a
scalable, automated, and auditable way. By defining PaC, integrating them into CI/CD pipelines,
enforcing them in real-time, and maintaining logs for compliance, PaC provides a robust
framework for secure access management in dynamic environments. The next section will explore
the outcomes, benefits, and limitations of implementing PaC for access control, based on case
studies and recent research findings [
            <xref ref-type="bibr" rid="ref26">26</xref>
            ].
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>7. Results and discussion</title>
      <p>
        Implementing PaC for RBAC and ABAC offers measurable improvements in security, operational
efficiency, and compliance. By automating access control management, PaC enables organizations
to enforce policies consistently across dynamic environments, such as multi-cloud and Kubernetes
infrastructures. This section examines the outcomes of PaC implementations in terms of security,
scalability, compliance, and adaptability, as well as challenges and limitations identified during the
research [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ].
      </p>
      <sec id="sec-7-1">
        <title>7.1. Enhanced security and consistency</title>
        <p>Results: With PaC, organizations achieved more consistent and reliable enforcement of access
control policies. The automation provided by PaC reduced manual interventions, minimizing the
risk of misconfiguration and unauthorized access.</p>
        <p>Impact: Implementing PaC in dynamic environments like Kubernetes and multi-cloud setups
has significantly improved access security by ensuring that RBAC and ABAC policies are enforced
in real time. Organizations observed fewer access control incidents, such as privilege escalation and
policy drift, due to the version-controlled and testable nature of PaC.</p>
        <p>Discussion: PaC’s versioning and automated validation allows for precise and transparent
control over policy changes. By deploying policies alongside application code, organizations
maintain security alignment with changing application requirements, creating a more agile
security approach.</p>
      </sec>
      <sec id="sec-7-2">
        <title>7.2. Scalability and reduced operational overhead</title>
        <p>Results: PaC enabled scalable management of RBAC and ABAC policies, even in environments
with a high volume of resources, roles, and users. Teams noted a significant reduction in the
operational burden associated with managing access controls manually.</p>
        <p>Impact: By using PaC, organizations could scale their access control systems in line with their
infrastructure growth, without a corresponding increase in administrative overhead. Automated
policies reduced the need for constant manual updates and mitigated the risks of “role explosion”
in RBAC and attribute sprawl in ABAC.</p>
        <p>Discussion: PaC frameworks, like Open Policy Agent (OPA) and HashiCorp Sentinel, allowed
teams to define and manage policies in a consistent, centralized format, making it easier to scale
access control policies across complex architectures. However, some organizations noted initial
setup challenges as they transitioned to code-based access management, particularly in aligning
policies across multiple cloud providers.</p>
      </sec>
      <sec id="sec-7-3">
        <title>7.3. Continuous compliance and auditing</title>
        <p>Results: PaC’s integration with CI/CD pipelines and centralized logging systems provided
organizations with a continuous compliance framework, automating audit trails and policy
validation processes. Real-time logging of access requests and policy enforcement decisions
enabled comprehensive auditing and traceability.</p>
        <p>Impact: By maintaining a versioned history of all policy changes, PaC facilitated audit
readiness and regulatory compliance. Organizations operating in regulated industries, such as
healthcare and finance, observed improved compliance outcomes, as policies were automatically
validated against industry standards like GDPR and HIPAA.</p>
        <p>Discussion: The ability to store policies in version control systems such as Git provided
transparency, traceability, and ease of auditing. PaC’s compatibility with CI/CD workflows ensured
that access control configurations were validated continuously, minimizing the risk of
noncompliance and allowing organizations to address regulatory requirements proactively.</p>
      </sec>
      <sec id="sec-7-4">
        <title>7.4. Improved adaptability and real-time enforcement</title>
        <p>Results: PaC empowered organizations to adopt policies in real-time, applying attribute-based
access controls that responded to contextual conditions, such as user location, device type, and
time. This adaptability allowed organizations to meet dynamic access control needs effectively.</p>
        <p>Impact: Real-time enforcement was especially beneficial in environments where attributes
change frequently. For instance, in ABAC implementations, PaC allowed policies to adapt to
changes in user roles, environmental factors, and other attributes, enabling more granular and
responsive access control.</p>
        <p>Discussion: PaC’s real-time adaptability is an advantage in cloud-native environments, where
rapid changes in infrastructure demand a flexible approach to access control. However, some
organizations encountered latency issues with attribute-heavy ABAC policies, indicating a need for
optimization to maintain performance at scale.</p>
      </sec>
      <sec id="sec-7-5">
        <title>7.5. Limitations and challenges</title>
        <p>While PaC significantly enhances access control capabilities, challenges remain in its
implementation and scalability. Key limitations encountered include:</p>
      </sec>
      <sec id="sec-7-6">
        <title>7.5.1. Complexity in policy management</title>
        <p>Issue: For organizations implementing attribute-based access control, the management of
attributes can become complex as the number of attributes grows. High attribute diversity often
requires highly specific policies, which can lead to “policy sprawl”.</p>
        <p>Discussion: Although PaC offers tools for versioning and automation, managing numerous
detailed policies and attributes can be challenging in large-scale environments. Simplifying
attribute management, possibly through consolidated or hierarchical policies, could help mitigate
complexity and improve operational efficiency.</p>
      </sec>
      <sec id="sec-7-7">
        <title>7.5.2. Initial setup and integration effort</title>
        <p>Issue: Integrating PaC into existing CI/CD pipelines and infrastructure required a significant initial
setup effort, particularly for organizations new to policy automation. Setting up and configuring
tools like OPA and Sentinel involved custom configurations and, in some cases, additional training
for teams.</p>
        <p>Discussion: The initial setup and learning curve may present challenges, especially for teams
that are less experienced in DevSecOps practices. Providing training or building templates for
common RBAC/ABAC configurations could streamline the adoption of PaC for access control.</p>
      </sec>
      <sec id="sec-7-8">
        <title>7.5.3. Performance overhead in real-time policy evaluation</title>
        <p>Issue: Organizations using attribute-heavy ABAC policies noted increased latency during policy
evaluations, especially in environments with real-time enforcement requirements. This latency
may impact user experience or system performance, particularly in high-demand applications.</p>
        <p>Discussion: Optimizing policy evaluation processes, such as caching frequently accessed
policies or balancing attribute granularity, can help reduce latency. Additionally, some
organizations may need to evaluate the trade-offs between detailed, attribute-rich policies and
simpler, role-based policies for performance-critical applications.</p>
      </sec>
      <sec id="sec-7-9">
        <title>7.6. Future directions and improvements</title>
        <p>To address these challenges, future research and development in PaC should focus on:</p>
        <p>Adaptive Policy Management: Developing methods to dynamically adjust policies based on
changing organizational and environmental contexts can improve the scalability and flexibility of
PaC for RBAC and ABAC.</p>
        <sec id="sec-7-9-1">
          <title>Enhanced Integration with AI for Policy Optimization: Leveraging machine learning to</title>
          <p>
            optimize policy decisions and identify anomalies can further enhance PaC’s ability to scale
effectively in complex environments. Also we can use methods of context analysis for optimizing
policies [
            <xref ref-type="bibr" rid="ref32">32</xref>
            ].
          </p>
        </sec>
        <sec id="sec-7-9-2">
          <title>Unified Policy Frameworks for Multi-Cloud Environments: Establishing unified policy</title>
          <p>
            standards for multi-cloud setups would simplify policy management and enforcement across
diverse platforms, reducing integration overhead and ensuring consistent access control.
PaC provides a powerful framework for implementing RBAC and ABAC in distributed,
cloudnative, and multi-cloud environments. By automating policy management, ensuring real-time
enforcement, and enabling continuous compliance, PaC improves security, scalability, and
suitability for access control systems. While challenges related to complexity, integration, and
performance persist, ongoing developments in PaC tools and methods offer promising solutions for
addressing these limitations. The final section will summarize the main findings, highlighting the
advantages and future potential of PaC for access control in dynamic environments [
            <xref ref-type="bibr" rid="ref33">33</xref>
            ].
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>Conclusions</title>
      <p>As organizations adopt increasingly complex, cloud-native architectures, the need for scalable,
flexible, and automated access control mechanisms has become paramount. PaC represents a
transformative approach to access control, enabling organizations to define, enforce, and manage
RBAC and ABAC policies through automated, code-driven processes. This research has explored
the benefits of implementing PaC for RBAC and ABAC, emphasizing its impact on security,
scalability, compliance, and adaptability in dynamic environments.</p>
      <p>PaC’s ability to integrate with CI/CD pipelines has made continuous compliance a reality,
providing automated policy validation and real-time policy enforcement across cloud and
multicloud environments. By managing policies in code, organizations gain the advantages of version
control, collaborative change management, and comprehensive audit trails, all of which contribute
to a more transparent and compliant access control framework. Additionally, the real-time
adaptability offered by PaC allows organizations to implement context-aware policies that respond
dynamically to changes in user roles, attributes, and environmental conditions, further enhancing
security in high-demand applications.</p>
      <p>Despite its advantages, PaC presents challenges that organizations must address, such as
managing the complexity of attribute-heavy policies in ABAC, optimizing policy evaluation for
high-performance applications, and overcoming the initial integration effort required for CI/CD
environments. As PaC continues to evolve, future developments—such as adaptive policy
management and AI-enhanced policy optimization—promise to address these limitations, making
PaC even more accessible and effective in a wider range of use cases.
In conclusion, PaC offers a robust framework for modern access control, enabling organizations to
enforce RBAC and ABAC policies at scale, with enhanced security, compliance, and efficiency. As
organizations continue to navigate the demands of cloud-native infrastructures, PaC provides a
scalable solution to automate, simplify, and strengthen access control, laying the groundwork for a
more secure and adaptable future in access management.</p>
      <p>Declaration on Generative AI
While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Iavich</surname>
          </string-name>
          , et al.,
          <article-title>Classical and post-quantum encryption for GDPR</article-title>
          , in: Classic, Quantum, and
          <string-name>
            <surname>Post-Quantum</surname>
            <given-names>Cryptography</given-names>
          </string-name>
          , vol.
          <volume>3829</volume>
          (
          <year>2024</year>
          )
          <fpage>70</fpage>
          -
          <lpage>78</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
             
            <surname>Shevchenko</surname>
          </string-name>
          , et al.,
          <article-title>Protection of information in telecommunication medical systems based on a risk-oriented approach</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>158</fpage>
          -
          <lpage>167</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P.</given-names>
             
            <surname>Skladannyi</surname>
          </string-name>
          , et al.,
          <article-title>Improving the security policy of the distance learning system based on the zero trust concept</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>97</fpage>
          -
          <lpage>106</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>O.</given-names>
             
            <surname>Vakhula</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
             
            <surname>Opirskyy</surname>
          </string-name>
          ,
          <string-name>
            <surname>O.</surname>
          </string-name>
           
          <article-title>Mykhaylova, Research on security challenges in cloud environments and solutions based on the “Security-as-Code” approach, in: Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3550</volume>
          ,
          <year>2023</year>
          ,
          <fpage>55</fpage>
          -
          <lpage>69</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>O.</given-names>
             
            <surname>Vakhula</surname>
          </string-name>
          , et al.,
          <article-title>Security-as-code concept for fulfilling ISO/IEC 27001:2022 requirements</article-title>
          , in: in
          <source>: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3654</volume>
          ,
          <year>2024</year>
          ,
          <fpage>59</fpage>
          -
          <lpage>72</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>[6] Palo alto what is secuirty as a code, 2024</article-title>
          . URL: https://www.paloaltonetworks.com/ cyberpedia/what-is
          <article-title>-policy-as-code</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>D</given-names>
            <surname>.</surname>
          </string-name>
           F. 
          <string-name>
            <surname>Ferraiolo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
           R. Kuhn,
          <article-title>Role-based access controls</article-title>
          , arXiv,
          <year>2009</year>
          . doi:
          <volume>10</volume>
          .48550/ arXiv.0903.2171
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>E.</given-names>
             
            <surname>Yuan</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
           Tong,
          <article-title>Attributed based access control (ABAC) for Web services</article-title>
          ,
          <source>in: IEEE International Conference on Web Services (ICWS'05)</source>
          ,
          <year>2005</year>
          . doi:
          <volume>10</volume>
          .1109/ICWS.
          <year>2005</year>
          .25
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <source>[9] Gartner Research</source>
          <year>2022</year>
          ,
          <article-title>Policy as Code' to Secure Application Deployments</article-title>
          and
          <string-name>
            <given-names>Enforce</given-names>
            <surname>Compliance</surname>
          </string-name>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Raban</surname>
          </string-name>
          ,
          <source>The Dark Side of Domain-Specific Languages: Uncovering New Attack Techniques in OPA and Terraform</source>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>T.</given-names>
             
            <surname>Baumer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Mueller</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
           
          <article-title>Pernul, System for Cross-domain Identity Management (SCIM): Survey and Enhancement with RBAC</article-title>
          ,
          <source>IEEE Access 11</source>
          (
          <year>2023</year>
          )
          <fpage>86872</fpage>
          -
          <lpage>86894</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2023</year>
          .3304270
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
             
            <surname>Aboukadri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Ouaddah</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
           Mezrioui, Boosted-3R:
          <article-title>Towards a novel framework for inferring ABAC policies</article-title>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Biswas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Baranwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tripathi</surname>
          </string-name>
          , ABAC:
          <article-title>Alternative by alternative comparison based multi-criteria decision making method</article-title>
          ,
          <source>Expert Syst. Appl</source>
          .
          <volume>208</volume>
          (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .1016/j.eswa.
          <year>2022</year>
          .118174
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>B.</given-names>
             
            <surname>Lee</surname>
          </string-name>
          ,
          <article-title>Using open policy agent (OPA) to apply policy-as-code to infrastructure-as-</article-title>
          <string-name>
            <surname>code</surname>
          </string-name>
          ,
          <year>2022</year>
          . URL: https://cloudsecurityalliance.org/blog/2020/04/02/using
          <article-title>-open-policy-agent-opa-to-applypolicy-as-code-to-infrastructure-as-code/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Sánchez-Gordón</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
             
            <surname>Colomo-Palacios</surname>
          </string-name>
          ,
          <article-title>Security as culture: A systematic literature review of DevSecOps</article-title>
          , in: ICSEW'20
          <source>: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops</source>
          ,
          <year>2020</year>
          ,
          <fpage>266</fpage>
          -
          <lpage>269</lpage>
          . doi:
          <volume>10</volume>
          .1145/3387940.3392233
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <article-title>Guest Expert on GitGuardian, What is policy-as-code? An introduction to open policy agent</article-title>
          ,
          <year>2022</year>
          . URL: https://blog.gitguardian.
          <article-title>com/what-is-policy-as-code-an-introduction-to-openpolicy-agent/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>W.</surname>
          </string-name>
           Salami,
          <source>HashiCorp Sentinel: An introduction</source>
          ,
          <year>2024</year>
          . URL: https://www.globallogic.com/ uki/insights/blogs/hashicorp
          <article-title>-sentinel-an-introduction/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>X. Zhang,</surname>
          </string-name>
          <article-title>Cloud governance and compliance on AWS with policy as code</article-title>
          ,
          <year>2021</year>
          . URL: https://aws.amazon.com/ru/blogs/opensource/cloud
          <article-title>-governance-and-compliance-on-awswith-policy-as-code/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Ferris</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          Comprehensive Guide to Automated
          <source>Testing for CI/CD Pipelines</source>
          ,
          <year>2023</year>
          . URL: https://qameta.io/blog/automated-testing
          <article-title>-ci-cd-guide/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kurii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
             
            <surname>Opirskyy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
             
            <surname>Bortnik</surname>
          </string-name>
          , ISO/IEC 27001:
          <year>2022</year>
          .
          <article-title>Analysis of changes and compliance features of the new version of the standard</article-title>
          ,
          <source>in: 9th International Scientific and Technical Conference Information Protection and Information Systems Security</source>
          ,
          <year>2023</year>
          ,
          <fpage>15</fpage>
          -
          <lpage>17</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>O.</given-names>
             
            <surname>Vakhula</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.</surname>
          </string-name>
           
          <article-title>Opirskyy, Research on security as code approach for cloud-native applications based on Kubernetes clusters</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3800</volume>
          ,
          <year>2024</year>
          ,
          <fpage>58</fpage>
          -
          <lpage>69</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <article-title>Policy as code in Kubernetes: security with seccomp &amp; network policies</article-title>
          ,
          <source>ArmoSec</source>
          ,
          <year>2024</year>
          . URL: https://www.armosec.io/blog/policy-as
          <article-title>-code-in-kubernetes-security-seccomp-and-networkpolicies/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>R.</surname>
          </string-name>
           Ferreira,
          <article-title>Policy design in the age of digital adoption: Explore how PolicyOps can drive policy as code adoption in an organization's digital transformation 1st Edition</article-title>
          , Packt Publishing,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>Hashicorp</given-names>
            <surname>Sentinel Documentation</surname>
          </string-name>
          ,
          <year>2024</year>
          . URL: https://developer.hashicorp.com/sentinel/docs
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>V.</given-names>
            <surname>Khoma</surname>
          </string-name>
          , et al.,
          <article-title>Comprehensive Approach for Developing an Enterprise Cloud Infrastructure</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3654</volume>
          ,
          <year>2024</year>
          ,
          <fpage>201</fpage>
          -
          <lpage>215</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>S. I.</given-names>
             
            <surname>Shamim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
             A. 
            <surname>Bhuiyan</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
           
          <article-title>Rahman, XI Commandments of Kubernetes security: A systematization of knowledge related to Kubernetes security practices</article-title>
          ,
          <source>in: 2020 IEEE Secure Development (SecDev)</source>
          ,
          <year>2020</year>
          ,
          <fpage>58</fpage>
          -
          <lpage>64</lpage>
          . doi:
          <volume>10</volume>
          .1109/SecDev45635.
          <year>2020</year>
          .00025
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Martseniuk</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Shadow</surname>
            <given-names>IT</given-names>
          </string-name>
          <article-title>risk analysis in public cloud infrastructure</article-title>
          ,
          <source>in: Cyber Security and Data Protection</source>
          , vol.
          <volume>3800</volume>
          ,
          <year>2024</year>
          ,
          <fpage>22</fpage>
          -
          <lpage>31</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Martseniuk</surname>
          </string-name>
          , et al.,
          <article-title>Universal centralized secret data management for automated public cloud provisioning</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems II</source>
          , vol.
          <volume>3826</volume>
          ,
          <year>2024</year>
          ,
          <fpage>72</fpage>
          -
          <lpage>81</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>B.</given-names>
             
            <surname>Burns</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Borg</surname>
            , Omega, and
            <given-names>KUBERNETES</given-names>
          </string-name>
          , Queue
          <volume>14</volume>
          (
          <issue>1</issue>
          ) (
          <year>2016</year>
          )
          <fpage>70</fpage>
          -
          <lpage>93</lpage>
          . doi:
          <volume>10</volume>
          .1145/2898442.2898444
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Martseniuk</surname>
          </string-name>
          , et al.,
          <article-title>Automated conformity verification concept for cloud security</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3654</volume>
          ,
          <year>2024</year>
          ,
          <fpage>25</fpage>
          -
          <lpage>37</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Dreis</surname>
          </string-name>
          , et al.,
          <source>Restricted Information Identification Model</source>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          Vol.
          <volume>3288</volume>
          (
          <year>2022</year>
          )
          <fpage>89</fpage>
          -
          <lpage>95</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>S.</given-names>
             
            <surname>Yevseiev</surname>
          </string-name>
          , et al.,
          <article-title>Development of a method for determining the indicators of manipulation based on morphological synthesis</article-title>
          ,
          <source>Eastern-European J. Enterp. Technol</source>
          .
          <volume>3</volume>
          (
          <issue>9</issue>
          (
          <issue>117</issue>
          )) (
          <year>2022</year>
          )
          <fpage>22</fpage>
          -
          <lpage>35</lpage>
          . doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2022</year>
          .258675
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>D.</given-names>
             
            <surname>Shevchuk</surname>
          </string-name>
          , et al.,
          <article-title>Designing secured services for authentication, authorization, and accounting of users, in: Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3550</volume>
          ,
          <year>2023</year>
          ,
          <fpage>217</fpage>
          -
          <lpage>225</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>