Homepage
All Cases
Secure by Design

Secure

Supply Chain Security in the Financial Sector

At CLOUDYRION, we have been selected by a leading FinTech company as a partner for IT security to adopt a security by design approach for the development of fintech services. In close collaboration with internal resources, external suppliers, and project teams, we ensured that new solutions meet the highest security standards before going live.

Supply Chain

Initial Situation

For many years, supply chain attacks have been a major concern for cybersecurity experts, as an attack on a single supplier can trigger a chain reaction that puts an entire network of providers at risk. Malware is the predominant attack method, used in 62% of incidents. According to the ENISA report „Threat Landscape for Supply Chain Attacks,“ which analyzed 24 recent attacks, robust IT security is no longer enough for companies as attackers shift their focus to suppliers. The growing impact of these attacks is evident in system downtimes, financial losses, and reputational damage. Current forecasts predict that supply chain attacks will quadruple in 2021 compared to the previous year. This emerging trend underscores the need for companies and their decision-makers to take action. New protective measures must be urgently introduced to prevent potential future supply chain attacks and respond appropriately when necessary.

Development

The rising threat of malicious code injection makes it essential to secure internal code and structural dependencies, both in open-source and commercial tools. Leaks of trade secrets or other sensitive data, and code manipulation before release, are common consequences of a compromised software build and delivery pipeline. Therefore, software development leaders should collaborate with their security and risk officers to ensure the integrity of both internal and external code by enforcing strict version control. Common security recommendations include the use of artifact repositories for trusted content, managing vendor risks throughout the deployment lifecycle, and securing secrets and signing code and container images.

Application

In large development projects for software applications and services aimed at end-users, it proved to be a major challenge to coordinate the various delivery pipelines of different teams involved. Specifically, the automated detection of vulnerabilities and malicious code posed a significant challenge due to the varying levels of awareness among the different entities involved.

Supply Chain Security

The objective was to establish comprehensive supply chain security, leaving no security gaps from development to end-user that could compromise systems and processes. The desired risk management needed to include pipeline security, covering all tests and tools used, as well as ensuring security during the application’s runtime. Based on recommendations from previous positive experiences, the company reached out to CLOUDYRION, specialists in IT security based in Düsseldorf. The security service provider impressed with an approach that combined comprehensive consulting, technological expertise, and pragmatic, solution-oriented support for users.

Challenge

A systematic security-by-design approach was needed to ensure that software produced by numerous internal developers and suppliers was free of vulnerabilities and malware and ready for deployment to end customers. CLOUDYRION was tasked with optimizing the process from development to practical use with a focus on security, reinforcing governance to make the products safer for both end-users and enterprise customers. One key requirement was to achieve the state of Minimum Valuable Security within three months.

Challenges included:

  • Technological diversity, ensuring full functionality in a hybrid cloud environment
  • Rapid software release cycles and insufficient pipeline software guardrails for Application and Infrastructure-as-Code
  • Geographical distance between teams
  • Compliance requirements (GDPR and PCI-DSS)
  • Insecure and highly segmented Continuous Integration/Continuous Delivery (CI/CD) tools

Solution

The process began with a detailed threat assessment. Together with the teams involved, CLOUDYRION identified potential attack vectors, attackers, and risk scenarios. Critical interfaces between the client and suppliers were thoroughly examined, including:

  • Single Sign-On integration
  • IPS systems
  • Web application firewalls
  • Identity & user access management: Assigning access rights and maintaining consistent role distribution for users
  • Certifications such as ISO, PCI-DSS, etc.

Based on these findings, the security infrastructure design was adjusted, and appropriate measures were implemented to effectively eliminate the identified threats. Early on, the tight project timeline proved to be particularly challenging. With the start of the security-by-design process, the iterative implementation of key project steps accelerated, ensuring that a secure and compliant go-live could be achieved within the three-month deadline.

During the project, the client decided to extend the process beyond the minimum requirements to continuously reduce the attack surface and gradually increase security maturity. The key tasks for CLOUDYRION included:

  • Developing a joint strategy with the client, defining and scheduling objectives
  • Providing targeted support to teams in integrating SCA, DAST, or IAST into their pipelines and interpreting results correctly
  • Designing detailed processes for the development phase, including the definition of risk-based pipelines (guardrails)
  • Recommending a trusted container registry/software code repository approach to avoid the complexity of too many tools with similar functions. Centralization with approved tools led to standardized and controlled deployments.
  • Hardening the CI/CD environment regarding security
  • Evaluating the security level of external software suppliers

Outlook

In line with the company’s requirements, CLOUDYRION continued to provide advisory services beyond the three-month period after go-live. This long-term support proved beneficial, especially as the security consultants had successfully equipped the users with the necessary know-how to handle common runtime questions independently. As a result, Cloudyrion was primarily consulted for exceptional issues, such as the selection and implementation of an SCA enterprise solution that was previously absent. This strategic approach has proven to be effective and is recommended for future projects, even beyond the scope of supply chain security.

Security that Drives Success

Integrate security into every layer of your business, ensuring sustainable innovation and resilience for long-term success. Get in touch with us today to schedule your first security review and take the next step toward a secure future.

Get in touch now

Insights

Insights

Zum Beitrag: The Untrusted Trust: Bypassing Multi-Factor Authentication in a Fortune 500 Company
cyber_security_team_in_space_with_laptops

Hacking

Bypassing Multi-Factor Authentication

The Untrusted Trust: Bypassing Multi-Factor Authentication in a Fortune 500 Company

In this blog post, we reveal how, as ethical hackers, we were able to bypass multi-factor authentication (MFA) in a real-world enterprise environment—and what organizations can learn from it to improve their own security strategy.

Read more
Zum Beitrag: Inside CLOUDYRION’s First LLM Pentest: Building a Framework for Testing AI Security
LLM Security

Hacking

Inside Our First LLM Pentest

Inside CLOUDYRION’s First LLM Pentest: Building a Framework for Testing AI Security

This article offers insight into the first-ever Large Language Model (LLM) pentest conducted by CLOUDYRION—how we started, the challenges we faced, and how we developed a simple yet effective testing and reporting framework for Large Language Models (LLMs).

Read more
Zum Beitrag: Why SBOM is Critical for Compliance Under the EU Cyber Resilience Act (CRA)
SBOM Compliance

Secure by Design

Why SBOM is Critical for Compliance Under the EU Cyber Resilience Act (CRA)

Why SBOM is Critical for Compliance Under the EU Cyber Resilience Act (CRA)

The EU Cyber Resilience Act (CRA) introduces mandatory security requirements for software and connected products, placing Software Bill of Materials (SBOM) at the core of compliance. This new legislation, as part of the broader EU Cybersecurity Strategy, aims to enhance the security of products with digital elements across the European market.

Read more

CLOUDYRION combines IT security with a culture of security to empower your projects. Together, we develop secure architectures, processes, and solutions that perfectly support your cloud strategy and organizational culture.