Author
Dr. Sophia Reynolds
Assistant Professor, Department of Information System and Cybersecurity, University of Melbourne, Australia
Abstract
Security and compliance have grown more difficult in today's quickly changing enterprise network infrastructures because of the difficulties in overseeing massive, automated installations. Traditional approaches to policy enforcement are frequently insufficient to handle security threats or compliance requirements in light of the growing popularity of Infrastructure-as-Code (IaC) and DevOps processes. By encapsulating policies in machine-readable code, Policy-as-Code (PaC) provides a revolutionary method of security and compliance management that enables automated and uniform enforcement across on-premises, cloud, and hybrid settings.
Keywords
Policy-as-Code Enterprise Networks Cybersecurity Compliance Infrastructure as Code
How to Cite This Article
APA Style:
Reynolds, S. (2025).
Policy-as-Code for Enterprise Networks: Security and Compliance in Automated Infrastructure Deployments.
International Journal of Economics and Management Intellectuals, 1(2).
Conclusion
The idea of Policy-as-Code (PaC) and its critical function in protecting and guaranteeing compliance in contemporary organizational networks have been examined in this study. Organizations can decrease human error, improve compliance auditability, strengthen security, and preserve uniformity across many environments by implementing PaC.
References
[1] Bera, P., Ghosh, S. K., & Dasgupta, P. (2009). Formal verification of security policy implementations in enterprise networks.
[2] He, B., Dong, L., Xu, T., Fei, S., Zhang, H., & Wang, W. (2016). Research on network policy combination and conflict detection in SDN.
[3] Tang, C., Yao, S., Cui, Z., & Mao, L. (2006). A network security policy model and its realization mechanism.
[4] Torres-Charles, C. A., Sánchez-Gallegos, D. D., & González-Compeán, J. L. (2025). Xook-Sec framework.
[5] Kim, S. Y., Kim, M. E., Kim, K., & Jang, J. (2002). Policy-based network security management.
[6] He, B., Fei, S., Wang, W., & Xu, T. (2018). Network policy enforcement using NEUTRON.
[7] Li, H., & Bai, H. (2025). Network security principles.
[8] Saha, B. K. (2018). Intent-based networks.
[9] Fogel, A., et al. (2015). Network configuration analysis.
[10] Beckett, R., et al. (2017). Minesweeper verification.
[11] Anderson, C. J., et al. (2014). NetKAT foundations.
[12] Ramli, C. D. P. K. (2014). Logic of XACML.
[13] Brown, M., et al. (2023). Batfish tool evolution.
[14] Chiari, M., et al. (2022). Static analysis of IaC.
[15] Verdet, A., et al. (2024). Security policies in Terraform.