Page 179 - Cyber Defense eMagazine September 2025
P. 179

cyber-attacks.  Common  and  avoidable  causes  of  cloud-related  breaches  include  misconfigurations,
            unsecured data repositories, and poorly managed user access controls.

            Cloud infrastructure often involves multiple service providers and complex deployment models, such as
            hybrid  or  multi-cloud  architectures.  Each  additional  layer  of  abstraction  and  third-party  involvement
            makes  it  more  challenging  to  maintain  consistent  security  controls.  Without  full  visibility  into  these
            environments, it is difficult to assess real-time exposure, enforce compliance, and respond quickly to
            incidents.



            Zero Trust, Full Protection: Monitoring Encryption & Data Protection in the Cloud

            The Zero Trust Cybersecurity framework is established on the principle that no user, device, or system
            should be trusted by default- even within an organization’s internal network.

            Fintechs transmit, store, and process sensitive data in the Cloud Environment including but not limited
            to- Personally Identifiable Information (PII) and Payment Card Information (PCI) based on their product
            and service offerings.

            With Zero Trust, stringent verification must occur before access to any DB or application in the Cloud,
            encryption  protocols  must  be  continuously  monitored  for  Data-At-Rest  (DAR)  and  Data-In-Transit  is
            required.



            Understanding How Zero Trust Architecture Functions























            The Zero Trust model is founded upon the National Institute of Standards and Technology (NIST) 800-
            207 framework established on three fundamental principles- “Never Trust, always verify”, Least Privilege
            Access, and Assume Breach.

            The implementation of a Zero Trust framework involves incorporating advanced technologies, including;
            Risk-based  Multi-Factor  Authentication  (MFA)-  verifies  user  identities,  Identity  Protection-  for  user





            Cyber Defense eMagazine – September 2025 Edition                                                                                                                                                                                                          179
            Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.
   174   175   176   177   178   179   180   181   182   183   184