Conf42 Platform Engineering 2025 - Online

- premiere 5PM GMT

Platform Engineering Security: Building Resilient Multi-Tenant Infrastructure for Financial Services

Video size:

Abstract

Learn how platform teams secure $155B in financial operations across 530+ orgs. Master Kubernetes hardening, GitOps security, and zero-trust architectures that cut incident detection from 21 days to 4 hours while achieving 99.91% uptime and 65% cost reduction

Summary

Transcript

This transcript was autogenerated. To make changes, submit a PR.
Hello everyone. Welcome. This is working as lead technology, having 20 years experience mostly in, financial services. I'm glad here to speak about platform engineering security in financial services. security is yeah, critical and constantly evolving topic. Industry financial services, storm of threats in 25 from sophisticated AI attacks, the primary security threats, phishing and social engineering. Ransomware insider threats. Third party and supply changes. How we are going to provide security and financial services. build resident multi talent, multi-tenant infrastructure that balances unprecedented security demands with rapid innovation for financial institutions migrating to cloud native architectures. The agenda, evolution of platform security from traditional infrastructure to self-service ecosystems with zero trust architecture, multi-tenant architecture, isolation boundaries, service MIS technologies, and secure by default configurations, container orchestration, microservices, bernet, security strategies, admission control. Security code policy framework integration, identity management and observability access controls, threat detection complaints about automation. The evolution of platform security. Modern platform engineering has transformed from traditional infrastructure management to creating sophisticated self-service ecosystems that empower development teams. While strict security controls financial services, organizations face unique challenges, stringent regulatory requirements. Cyber attacks I requirements need for business agility. Security code Multitenant financial services require careful of isolation, boundaries, data segregation, and access control, implementing sophisticated micro segmentation strategies that create defense in depth at every layer of the stack. Service miss technologies enabling fine grain traffic control and the integration of all interservice communication within mutual transfer layer services and policy driven access control. by legitimate exceptions, transform security, enable of innovation service. ME technologies have emerged as a current store of secure multi. Platform in financing, enabling fine grain traffic control, precise routing and loading balancing between services with comprehensive policy enforcement and end-to-end encryption. mutual LS for all service to service communication, ensuring data confidentiality and integrating when you're using, encryption and description, make sure it'll follow that. the patents while transforming that data from one system to other system, from starting to ending portable security policies that travel with workloads, ensuring consistent production regardless of deployment location. It has to follow the same workloads and ensuring the consist protection regardless of the deployment locations, wherever its transmitting, it has rules, regulations, container orchestration, security, Comprehensive, security strategy. Kubernetes has become the standard for container orchestration in financial services. If we see all the organization, they're following the Kubernetes with the microservice nowadays, but its flexible demand. Careful security considerations. Platform engineers develop strategies that address every aspect of the container life, image scanning and vulnerability management. Secure configuration under, deployment, runtime protection and monitoring. They cloud and for the image scanning and nowadays the document systems game. So it'll load, the of data into their systems and, with, random, they can able to provide the corresponding document, admission controllers, enforce policies that prevent. Configuration from, entering production. If you see that, admission controls here, we can provide the, and, based on that, only the particular, runtime monitoring, detecting anomalous behavior that might indicate Compromise Pro-active transforming security from reactive incident response. To predict threat prevention admission controllers. Survey the critical gatekeepers in financial services platforms, enforcing policies that prevent insecure configuration from entering production environment. When it's layer elevation, each and every layer have the specific validations to make sure it'll, hundred percent the test cases will cause. That way they're going to implement checks, everything from resource limits to security contract, ensuring workloads meets. organizational standards policy and certain automatically rejects non-compliant workloads and provides clear feedback mediation steps so that it, those noncompliant workloads details because all validation complaints, reporting and security analysis so that if something happens, they can go back to the history and they'll verify it to track the, where it's, violating. G and security as a code, in the DevOps systems, everywhere. They're the gi. So gi closely platform teams, infrastructure. Infrastructure as a code, as code. treating rigorous review process policy as code codifying, security requirement, ways that missions can enforce and humans can understand. progressive Security Gate, validating. Before changes, secure scanning, integrating vulnerabilities and compliance scanning throughout the deployment pipelines. If you have even major critical minor info level. Making it and providing so that the security, most of the Secur 99, 99 0.99% repeatable deployment patterns that eliminates configuration drift and ensure consistent security controls. Identity and the access management. At scale. Managing identities across complex financial services ecosystems require sophisticated approaches that balance security with usability, identity lifecycle management, automatically provisioning under. De provisioning access based on the author, authoritative sources attribute require access evolving beyond role-based models to consider context for fine grain permissions, mission identity management, implementing robust patterns for managing services, account, a, keys, passwords, and other non-human identities. Incident platform of telemetry data. Platform engineers must build systems that transform this data into actionable security intelligence in distributed tracing, providing visibility into complex request flow, enabling teams to understand not just what happened, but why and how security information and event management creating. And correlate platform event with security signals drastically reducing detection and investigation time. Automated response, implementing workflows that contain threats while gathering evidence for later analysis. What are the compliance, automations. Meeting requirement efficiently. Efficiently. Financial services organizations face complexity requirements that traditionally required manually processes and extensive documentation. Platform Mini are automate, complaints through continuous monitoring and, evidence collection, automated as assessment against regulatory requirements. Generation immutable investigation verification, from, in platform while reducing and, Friction. the most secure platforms provides no value. Developers can't use it efficiently. Platform needs to focus intensively on creating developer experiences that make secure choices, the EEG choices, self-service capabilities, enabling developer, to provision. While automating policy source security requirements are meting, writing developers will archite solution without, cons concerning innovation through templates, examples, and automated tools, feedback. Monitoring how developers interact with platform capabilities and where friction occurs to continuously refined offerings. This approach allows developers to focus on business logic rather than infrastructure building for the future. Architecture a threat landscape and regulatory continues to evolve. Platform architecture and can adapt without reconstruction. Platform engineering build evolutionary through modular and clear interfaces, comprehensive testing, engineering practices, updateable security controls as well. Engineering for security. Engineering practice platform teams understand systems, behavior, relevant weaknesses before attackers can them. One is control experiments, failure, injections, observ analysis, security Harding, the path forward platform Engineering, security, and financial services represent critical discipline. That continues to evolve rapidly. Success requires balancing, completing demands. One is security and usability, creating security systems that developers can. Second is complaints and agility. Meeting regulatory requirements while enabling rapid innovation so it won't lead further complexion. Standardization and innovation, providing consistent patterns that don't any creative solutions so that it'll be adaptive. Understand so that it'll be easy to use in the financial, security systems. Ent future addressing current rates while building adaptable architectures. Whenever we are adding that, current threats, if you're considering it has to support for the future also to restrict as well by embracing security as a fundamental platform capability rather than and feature platform engineering teams questioning their organization for success in your increasingly complex digital landscape. Thank you all for giving me the opportunity.
...

Nageswara Rao Nelloru

@ Marquee Technology Solutions, Inc., USA



Join the community!

Learn for free, join the best tech learning community

Newsletter
$ 0 /mo

Event notifications, weekly newsletter

Access to all content