International Journal For Multidisciplinary Research

E-ISSN: 2582-2160     Impact Factor: 9.24

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 8, Issue 3 (May-June 2026) Submit your research before last 3 days of June to publish your research paper in the issue of May-June.

Continuous Compliance as Code: AI-Driven Detection and Auto-Remediation of Regulatory Drift in Regulated Banking Infrastructure

Author(s) Ajay Devineni
Country United States
Abstract SOC 2 Type II compliance in cloud-native financial services environments is typically managed as a periodic discipline: scheduled audits, point-in-time assessments, and quarterly remediation cycles. This approach is structurally misaligned with the continuous change velocity of modern cloud infrastructure, where security group rules, IAM policies, patch baselines, and certificate configurations change on timescales of days rather than quarters. The gap between periodic compliance snapshots and continuous infrastructure reality creates compliance drift — deviation of actual infrastructure state from required compliance posture — that accumulates silently between audit cycles. Research indicates that approximately 90% of large-scale infrastructure-as-code deployments experience drift, and nearly half of these deviations remain undetected. This paper presents a continuous compliance as code framework implemented across six credit union banking applications at NCR/Candescent, integrating Wiz, Orca Security, CrowdStrike Falcon, Carbon Black, and Cloudflare with AWS-native controls and Terraform-based infrastructure as code to create a continuously monitored and automatically remediated compliance posture. The framework treats every SOC 2 control as a continuously evaluated state assertion rather than a periodic check, with automated remediation pipelines self-healing specific categories of drift without manual intervention. Outcomes include elimination of all patch compliance drift within a 24-hour detection-to-remediation window, zero certificate-related compliance findings in the most recent SOC 2 Type II audit cycle, and SOC 2 audit evidence assembly reduced from two weeks to four hours through continuous automated evidence generation.
Keywords SOC 2 Compliance, Compliance as Code, Wiz Security, Orca Security, CrowdStrike Falcon, Carbon Black, Cloudflare, AWS WAF, Certificate Lifecycle Management, Patch Management, Infrastructure as Code, Terraform, Regulatory Drift, Financial Services Cloud.
Field Engineering
Published In Volume 7, Issue 2, March-April 2025
Published On 2025-04-05
DOI https://doi.org/10.36948/ijfmr.2025.v07i02.75738

Share this