Loading Now

Abstract

In an era where cloud computing has become ubiquitous, its adoption in the financial technology (FinTech) sector poses unique security challenges, notably in identity and access management (IAM). IAM serves as a cornerstone for safeguarding sensitive financial transactions and personal data against unauthorized access and cyber threats. This paper explores the intricacies of IAM within the cloud environment, focusing on enhancing authentication and authorization processes for financial services. Financial institutions can strengthen their security posture by employing advanced IAM strategies, such as granular permissions, role-based access control, and stringent policy enforcement. Through the examination of Amazon Web Services (AWS) IAM, we illustrate how tailored IAM policies and practices can mitigate vulnerabilities and ensure robust banking security in the cloud.

Keywords

Cloud Computing, Access Management, Banking Security, Vulnerabilities, Cloud Controls, Data Protection, Role-Based Access Control (RBAC), Compliance and Regulatory Frameworks, Cloud Native Security

References

  1. Cyber Insights Archives – Cybersecurity Service | CyberFin. https://cyberfin.net/category/cyber-insights/
  2. Key Security Considerations for CISOs in 2022. https://businessinsights.bitdefender.com/key-security-considerations-for-cisos-in-2022
  3. Next generation security operations and response | EY Australia. https://www.ey.com/en_au/consulting/next-generation-security-operations-response
  4. security – José da Cruz – Page 2. http://josedacruz.com/tag/security/page/2/
  5. Marzouk, Zach. “How to Secure Your Multi-cloud Deployments.” IT Pro, vol., no., 2021, p. n/a.
  6. Protect SaaS Business with Kloudwerk’s Expert Guidance. https://kloudwerk.com/adopting-a-zero-trust-security-model-for-saas/
  7. Untangling the World of Payment Gateways – TalkFintech. https://talkfintech.com/featured/payment-gateways/
  8. Single Sign-On (Explained). https://www.liveagent.com/customer-support-glossary/single-sign-on/
  9. Series: Exploring Microsoft Azure Landing Zone Best Practices – Chapter 2. Planning your Azure Landing Zone – Faychutech. https://faychutech.com/series-exploring-microsoft-azure-landing-zone-best-practices-chapter-2-planning-your-azure-landing-zone/
  10. User Access Review – Glossary | Opal. https://opal.dev/glossary/user-access-review
  11. Wireguard MFA: The Ultimate Guide : sshstores.net | Sewamobil. https://sewamobilsurabaya.org/wireguard-mfa-the-ultimate-guide-sshstores-net
  12. Ardomus Networks Corporation Unveils Wi-SUN Mesh Gateway for Enhanced IoT Operation Efficiency and Sustainability. https://www.secutech.com/23/en/exnewsdetail.aspx?nid=2245
  13. Security best practices in IAM – AWS Identity and Access Management. https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html