Cloud-based compliance and data security solutions in financial applications using CI/CD pipelines
1 Wells Fargo, Charlotte, North Carolina, USA.
2 The Vanguard Group, Charlotte, North Carolina, USA.
3 Independent Researcher, Sheffield, UK.
4 Independent Researcher, United Kingdom.
Research Article
World Journal of Engineering and Technology Research, 2024, 03(02), 011–021.
Article DOI: 10.53346/wjetr.2024.3.2.0059
Publication history:
Received on 08 October 2024; revised on 14 November 2024; accepted on 17 November 2024
Abstract:
In the fast-evolving landscape of financial services, data security and regulatory compliance are critical challenges that cloud-based solutions can address effectively. This paper explores the implementation of cloud-based compliance and data security solutions in financial applications, with a specific focus on using Continuous Integration and Continuous Deployment (CI/CD) pipelines. By integrating CI/CD pipelines, financial institutions can streamline deployment processes, ensuring rapid delivery while maintaining compliance with regulatory frameworks such as GDPR, PCI-DSS, and SOC 2. The CI/CD framework automates the testing and monitoring of security protocols, facilitating early detection of vulnerabilities and enhancing data integrity and confidentiality. Our approach leverages cloud-native tools and automation to implement robust security controls, including automated compliance checks, infrastructure-as-code (IaC), and real-time threat detection. Furthermore, we discuss strategies for integrating DevSecOps practices within CI/CD pipelines to reinforce compliance measures and optimize risk management processes. A case study demonstrates how financial institutions can achieve higher levels of security and compliance using cloud-based CI/CD pipelines, resulting in reduced deployment times and enhanced adaptability to regulatory changes. This study highlights how cloud-based CI/CD solutions can serve as an effective framework for managing complex regulatory requirements and safeguarding sensitive financial data in an increasingly digital and interconnected environment.
Keywords:
Cloud-based security; Compliance automation; Data security; Financial applications; Cloud computing; Financial data protection; Threat detection
Full text article in PDF:
Copyright information:
Copyright © 2021 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0