Financial Services

What Financial Services Should Know About Cloud Data Protection and Security

According to a 2021 Google/Harris Poll survey, 83% of financial services companies are “deploying cloud technology as part of their primary computing infrastructures.” The research also found that 38% of respondents use a hybrid cloud/on-premises environment, 28% rely on a single cloud, and 17% use multi-cloud. 

The benefits of cloud computing for financial institutions are well documented: The cloud allows for greater flexibility and scalability, reduced costs, increased efficiency, and critical data analysis. As financial services companies become more digitally adept, they accrue massive amounts of valuable analyzed data, broadening their targets for hackers and cybercriminals. Banks and other financial institutions are under attack and must manage extensive enterprise infrastructure and subject to targeted campaigns and persistent threat actors. 

As financial services organizations grow more reliant on the cloud, they must first understand what they are responsible for protecting and what their cloud provider must protect, then employ the appropriate protection methods to ensure data is protected in a way that maintains compliance and forwards business goals. The following suggestions will help financial services organizations do just that.

financial services icon

Understanding the shared responsibility model

Organizations operate under a shared responsibility model with cloud providers. Although it is easy to conceptualize, implementing a shared responsibility model requires much coordination. In many instances, a shared responsibility model dictates that cloud providers are responsible for the security “of” the cloud, and organizations are responsible for security “in” the cloud. 

Think of it this way: A home security provider can install a protection system, but it is up to the homeowner to identify where the sensors are located and ensure that it is armed before leaving the house. Similarly, a cloud provider protects the cloud’s infrastructure to reduce intrusion risk, while the organization protects the data if a breach occurs. It is also essential to recognize that each cloud provider may vary in terms of the protections they offer.

For example, some providers do not offer field-level encryption to organizations, allowing potential hackers easy access to data. This requires financial organizations to seek assistance to gain that protection elsewhere, while others require organizations to consider a unique approach to de-identifying data and protecting privacy.

The following steps can help prepare organizations to protect their data under a shared responsibility model:

 Identify sensitive data

Use advanced data discovery methods to find sensitive data in their repositories before moving them to the cloud. Privacy regulations must be top of mind due to the rapidly expanding scope of what is considered sensitive. For example, IP addresses and geolocation information are now regarded as sensitive in addition to personally identifiable information (PII), such as social security numbers and birth dates.

Determine data usage 

Identify the purpose of collecting data to comply with privacy regulations, such as GDPR and CCPA. Next, map out how to process the data and whether to share it with a third party. Financial services firms must ensure that this data does not land into unauthorized hands, resulting in potentially hefty fines.

Assign access control

Determine who can access that data for processing. Creating customized views for individuals based on their persona using dynamic masking tools is one method. For example, an application developer needs a different perspective than a data scientist who accesses the same dataset in the cloud.

Research the cloud provider’s security qualifications 

Like any service, cloud service providers should have quantifiable evidence demonstrating a commitment to cloud security. Conduct due diligence in researching their industry-specific cloud security certifications and publish regular reports associated with compliance and audits.

Seek out advanced protection 

Audit the protections offered by the cloud provider and the protections the organization currently deploys, then determine what additional tools are necessary to bridge the gap.

Protecting the data analytics pipeline

Financial services providers use data analytics across functions—from sales and marketing to fraud detection and risk mitigation. The cloud’s limitless storage capabilities prompt enterprises to migrate data from on-premises environments, store it in data lakes and extract valuable data into warehouses for analysis. Analyzed data stored in the cloud is a massive target for criminals due to its high value and is often not appropriately protected. Many organizations relax security controls to momentarily enable easier access but forget to restore the necessary protections. Let’s take a closer look at methods financial organizations should incorporate to ensure their data is secure through the analytics pipeline.

Early protection methods 

Security controls for the analytics pipeline can be categorized into two groups: visibility and entitlement. According to Gartner, visibility pertains to implementing “controls that remove ambiguity and increase visibility” of data, while entitlement is the management of data access. Organizations can address visibility and entitlement through data discovery, protection, and monitoring strategies.

  • Discovery. Data varies in sensitivity levels, and it is essential to determine how each piece of unstructured data will be protected upon entering the pipeline. In discovery, each file or record is processed to identify the data and assigned a protection policy based on the level of its sensitivity, applicable compliance standards, and eventual use. Applying detailed metadata also helps clear any confusion about what a piece of data is and who should access it. 
  • Masking. If a piece of data has sensitive information, a social security number, for example, but will undergo analytics, masking occurs. Masking prevents the actual value of data from being seen by anyone, but it comes at a steep price — that data can never be processed downstream. This data will be stored for a fixed period of time—typically for compliance purposes.
  • Tokenization. Data that contains sensitive information but will undergo analytics is tokenized. This protection method takes a piece of data and replaces it with other characters in the same format. For example, a tokenized Social Security number would consist of nine random numbers to look like an actual social security number. Tokenization allows existing applications to analyze the data, even though it is not real data. If a hacker accessed tokenized data, any analytics they performed would be inaccurate because it does not reflect actual values.

Encryption and data sharing

At this point, data analytics can begin, which makes data more valuable. As such, deeper protection, like encryption, is necessary to move forward. Encryption converts plain text data into unreadable ciphertext and can only be deciphered with a key that is accessed by only a privileged few. Innovative techniques are now becoming available to analyze that data by multiple parties without ever decrypting it. Once analyzed, data must remain encrypted for the entirety of its lifecycle.

Once encrypted, financial organizations can rest assured that their data has the highest protection for data sharing activities. For example, analyzed data is shared within the organization to provide the insight necessary to make crucial decisions related to customer acquisition, preferred services, and what products to offer. Only those with authorized access should be able to view the data. Authorized personnel grant access through encryption keys—a random string of bits that scramble and unscramble encrypted data.

Hold Your Own Key (HYOK) and Bring Your Own Key (BYOK) technology are user-controlled encryption keys that can be used to protect data in a given provider’s application or infrastructure by restricting who can unlock encrypted data. HYOK and BYOK solutions should:

  • Implement a key virtualization layer (KVL). This allows the software to integrate with multiple key management solutions via industry-standard protocols, which is especially important for financial service providers, given the myriad regulations they must consider.
  • Feature a two-tier hierarchy for key management—also commonly called envelope encryption. This method uses a master key (MK) that the customer can use to encrypt data encryption keys (DEKs). This method allows organizations to rotate and/or revoke their MK; the latter operation will invalidate DEKs and render data useless in an environment.
  • Source multiple disparate keys. This action should permit sourcing from separate tenants or entities or geographical jurisdictions or nation-states and apply those to encrypt the actual data values in a multi-tenant data store at the row level.

Financial service providers also share data outside of the organization, which can increase the risk of data exposure. Encryption allows organizations to participate in the data pooling with multiple financial service providers to gain deeper insights into the industry at large. Often, security and bureaucracy can impede the ability to collaborate across organizations in various scenarios and industries. To take advantage of the power that data sharing provides, financial organizations must address privacy and security concerns by anonymizing data and data owners while still allowing analytics and machine learning operations to process. 

With encrypted data, organizations can participate in industry data collaboration exercises knowing only they will be able to view their data while aggregate analytics auditing occurs. Encryption significantly reduces the risk of unauthorized access and potential data breaches.

Finding the right data security partner

In its 2021 report, “2022 Strategic Roadmap for Data Security Platform Convergence,” Gartner released details around new data protection terminology. It explained how the convergence of many data security technologies—like data masking, file encryption, and tokenization—will drive the evolution of the Data Security Platform (DSP). The emergence of DSP comes at a time when security is growing more complex—especially financial organizations that are newly able to analyze data with cloud modernization.

Organizations that previously used basic security protocols can now apply more secure, in-depth ways to protect their data with a DSP. Companies can use privacy-enhancing computation to ensure security protocols can be implemented at every point throughout the analytics pipeline. This is key to staying compliant and fully protecting customer data that is highly valuable to attackers for financial organizations. DSPs make data security easier to manage, as organizations work with a single platform instead of many, inherently reducing exposure risk.  

When looking for a DSP partner, financial organizations should consider the following:

  • Easy integration. A data protection system should seamlessly integrate into any primary cloud provider, like AWS, Microsoft Azure, GCP, major container-based platforms like Docker and Kubernetes.
  • Full range of services. A data security platform should allow organizations to encrypt, tokenize, and mask data in the cloud without the difficulties of modifying code or embedding software development kits (SDKs) and support data protection from production to processing in deployments with cloud services.
  • Comprehensive database protection. Databases like Postgres, MySQL, MariaDB, and Microsoft SQL Server often contain highly sensitive data for financial institutions, like credit card details, social security numbers, and personally identifiable information. This information is highly valuable and sought after by attackers, so it is necessary to protect it throughout the data pipeline.
  • At-rest and in-motion protection. Typical data protection systems are designed to protect data at rest but leave it completely unsecured during the remainder of its time in the pipeline. Look for a solution that protects and secures the data while at rest and in motion, allowing access to only highly-qualified and authorized users. 
  • No-code/low-code implementation. This feature allows financial companies to implement their own transparent data security mesh on-premises or in the cloud to secure data throughout its lifecycle. In a zero-trust world, proactively defending and protecting data is essential to ensure only the proper channels use or see data. 
  • Compliance expertise. Financial organizations are also under pressure to comply with long-standing industry data security baselines, like PCI-DSS and SOX. On top of finance-specific data protection laws, governments create privacy regulations like GDPR (EU) and CPRA (California). It is critical to have regulatory experts on hand who understand the current state of compliance and have a clear vision of emerging trends that could alter existing regulations or potentially spawn new ones. 

As data protection grows more complex, financial services organizations must be prepared to implement best-in-class security methods. Learn how Baffle can help with its data-centric protection for financial services.

Our Solution

Baffle delivers an enterprise level transparent data security mesh that secures data at the field or file level via a "no code" model.  The solution supports tokenization, format preserving encryption (FPE), database and file AES-256 encryption, privacy preserving analytics and access control. As a transparent solution, cloud native services are easily supported with almost no performance or functionality impact.

Icon Simplified

Simple

No application code modification
required

Icon Fast

Fast

Virtually no performance
impact

Icon Seamless

Seamless

Integrates easily into your
infrastructure

Icon Secure

Secure

AES encryption in memory, in use,
and at-rest

Schedule a live demo with one of our solutions experts to get answers to your questions