End-to-end Cloud Security within Six Weeks for a Fintech Firm

Client Success

Securing Cloud Environment End to End for a Canadian Fintech Firm within Six Weeks

The Client

The client provides technology and support solutions to credit unions in Canada, empowering them to adapt to an evolving market through sustainable innovation, leadership and support.

The Challenge

It recently set up a cloud-first IT environment hosted on Amazon Web Services (AWS), with third-party vendor connections to its credit union partners. The client was concerned about the security of its cloud operations, especially around protecting its intellectual property, third-party API connections, customers’ personally identifiable information from unauthorized use and access, and the overall security of its cloud-hosted database.

Since the client’s cloud environment hosted multiple customer accounts and supported continuous transactions, it was also important to address the limited visibility and loss of control that comes with a cloud-hosted IT infrastructure.

The client understood the importance of having a strategic partner with expertise in AWS’s cloud security tool landscape to implement an AWS-native secure environment. 

The Solution

Persistent, an AWS Premier Tier partner, had a front-row view of AWS-native security capabilities and leveraged them to secure the client’s cloud-hosted data, IT infrastructure, and applications, all within six weeks. We ensured compliance with cloud-first security protocols with a dedicated team of security experts providing round-the-clock support.

We enabled continuous monitoring and threat detection powered by AWS Inspector, Guard Duty, Security Hub, Cloud Trail, Config, Macie, Cloud Watch, and AWS Shield to protect against external threats .

To secure data transit between the client’s cloud environment and credit union partners, we deployed secure site-to-site virtual private network connections to prevent unauthorized entities from intercepting or accessing data. We also implemented identity-based access policies to ensure the right users gained access to the right applications.

We monitored traffic flow logs to preempt potential security threats from third-party API connections . To cut out noise from security tools, we also set up a prioritization matrix to identify relevant security alerts, coordinate with respective teams to assess risk and impact, and track them till closure.

To secure the entry points in the cloud network, we implemented Cisco Firewalls and deployed AWS IAM and identity center  to orchestrate role-based access policies for secure access to applications and data.

We used CloudTrail to log API activities and data events in the client’s AWS account for historical analysis and prediction.

The Outcome

End-to-End Secure Cloud Operations with Zero Breaches.

With Persistent’s cloud security expertise, the client was able to:

  • Secure end-to-end cloud operations with zero breaches
  • Consistently maintain a score of 98+ on AWS Security Hub
  • Ensure that the environment was 100% compliant with the required security standards
  • Save 30% in operational expenses while prioritizing security alerts
  • Ensure 100% uptime in the cloud environment

Contact us

(*) Asterisk denotes mandatory fields

    You can also email us directly at info@persistent.com

    You can also email us directly at info@persistent.com