Slide 1

Slide 1 text

Confidential │ © VMware, Inc. How Cloud Native Improves & Ensures Security, Governance, and Trust in Finance @ Financial Services Institutions Darran Rice & Coté VMware Tanzu July 11th, 2023

Slide 2

Slide 2 text

Confidential │ © VMware, Inc. 2 Darran Rice Coté

Slide 3

Slide 3 text

Confidential │ © VMware, Inc. 3 Why security is important at financial institutions?

Slide 4

Slide 4 text

Confidential │ © VMware, Inc. From monoliths to cloud native apps Monolith All components in one runtime. All processing takes place in that runtime. No network reliance. N-Tier Each component in separate runtime. Processing takes place in each runtime. Components communicate over a network. Cloud Native Each component broken down into services all running in own runtime. Processing takes place in individual runtime. High network dependency for all components to communicate over network. Client Server Access components run in client runtime. All other app components run in one runtime. Processing takes place in client and in app component runtime. Client to Server communications over network.

Slide 5

Slide 5 text

Confidential │ © VMware, Inc. 5 To secure cloud native apps, “shift left” security work & verification It’s not just dumping responsibility on developers, it’s collaborating on security earlier

Slide 6

Slide 6 text

Confidential │ © VMware, Inc. 6 Access Control & Data Handling Policy Templates & Guardrails Continuous Demonstration of Compliance

Slide 7

Slide 7 text

Confidential │ © VMware, Inc. 7 Access Control and Data Handling

Slide 8

Slide 8 text

Confidential │ © VMware, Inc. 8 Policy Templates & Guardrails

Slide 9

Slide 9 text

Confidential │ © VMware, Inc. CD CODE CI Continuous Demonstration of Security and Compliance Version Control Build Deploy Operate Automated container packaging Compliance and Security Image Registry Scan for security and compliance violations • K8s Workload misconfiguration • Image vulnerabilities • Malware and file reputation • Secrets Harden/Identify Risk Continuously scan images Harden/Identify Risk Enforce Security and compliance standards • Image vulnerability by severity • K8s Workload configuration • Image file reputation and secrets Harden/Identify Risk Prevent unauthorized workloads • Prevent Vulnerable images • Enforce Compliance standards • Workload Risk Prevent Enforce workload config to reduce risk • Workload permission and exposure • Resource limits • Workload labels and setup Remediate

Slide 10

Slide 10 text

Confidential │ © VMware, Inc. 10 Cloud Native Application Security & Compliance the VMware Way

Slide 11

Slide 11 text

Confidential │ © VMware, Inc. 11 Next Steps… Ask how much time you spend demonstrating compliance? Find your unsupported Spring & Java apps Free one hour consultation to bootstrap your cloud native security plan

Slide 12

Slide 12 text

Confidential │ © VMware, Inc. 12

Slide 13

Slide 13 text

Confidential │ © VMware, Inc.

Slide 14

Slide 14 text

Confidential │ © VMware, Inc. 14 Make sure you join us for the next instalment of the Financial Sector Webinar Series 28 June: Session 1 – Customer Experience & Innovation Learn how banks are moving from a project to a product software model to innovate and improve banking services and remain competitive. 4 July: Session 2 – Escaping the Legacy Trap Learn how banks are modernizing the legacy app portfolios that are holding them back. Attendees will also receive a free copy of Escaping the Legacy Trap that details the process large organizations are using to modernize their legacy application portfolio. 11 July: Session 3 – How Cloud Native Improves & Ensures Security, Governance, and Trust in Finance Hear how banks are using cloud native tools and practices to ensure security and compliance.