Secure Banking Microservices on AWS: A DevSecOps Framework

Authors

  • Karthik Allam Big Data Infrastructure Engineer at JP Morgan & Chase, USA. Author

DOI:

https://doi.org/10.63282/3050-922X.IJERET-V5I3P108

Keywords:

Secure banking, microservices, AWS, DevSecOps, cloud security, CI/CD, infrastructure as code, compliance, container security, IAM, threat modeling, PCI DSS, AWS Well-Architected, observability, monitoring, automation, zero trust, security pipelines, secrets management, banking compliance

Abstract

These days, it's hard to be open to new ideas and ways of doing things while simultaneously keeping your digital bank account safe. This post speaks a lot about a DevSecOps plan for keeping banking microservices safe on Amazon Web Services (AWS). The proposed method links the development, security, and operations teams by making security a part of the full development process instead of something that comes later. AWS Identity and Access Management (IAM), Key Management Service (KMS), Secrets Manager, and Cloud Trail are all AWS-native services that work together to make sure that identity management, data protection, and full audit trails are all strong. We deployed the system in containers using either Amazon Elastic Kubernetes Service (EKS) or ECS. We also automatically look for weaknesses and check for compliance on a regular basis to make sure the system is safe and can grow. The security model used by Amazon Guard Duty and Security Hub is "zero trust." This means that they only let people in who need to do their jobs. They also contain rules like "automated threat detection" and "encryption at rest and in transit." CI/CD pipelines work better when they have tools for analyzing both static and dynamic code, enforcing policy-as-code, and rolling back changes automatically. It's simple to get things properly the first time. Centralized logging, Cloud Watch for real-time monitoring, and proactive alerting systems all let you see what's going on and fix problems more quickly. A DevSecOps model that incorporates everything could help financial companies come up with new ideas faster, make sure they follow the rules (such PCI DSS and GDPR), build trust with customers, and lower the risks to their operations and security. In this article, we discuss best practices and why it's so crucial for everyone to know what they need to do. This implies that developers, security engineers, and operations teams all need to work together to make sure that security is a part of every stage of the financial application's life cycle. The architecture lets businesses offer microservices that are safe, fast, and reliable in a cloud environment that is always evolving. It also helps organizations quickly adjust to new policies and risks that come up in the digital world

References

[1] Das, BK Sarthak, and Virginia Chu. Security as Code: DevSecOps Patterns with AWS. “O’Reilly Media, Inc.", 2023.

[2] Chandramouli, Ramaswamy. "Implementation of devsecops for a microservices-based application with service mesh." NIST Special Publication 800 (2022): 204C.

[3] Manda, Jeevan Kumar. "Augmented Reality (AR) Applications in Telecom Maintenance: Utilizing AR Technologies for Remote Maintenance and Troubleshooting in Telecom Infrastructure." Available at SSRN 5136767 (2023).

[4] Jani, Parth. "Predicting Eligibility Gaps in CHIP Using BigQuery ML and Snowflake External Functions." International Journal of Emerging Trends in Computer Science and Information Technology 3.2 (2022): 42-52.

[5] Pakalapati, Naveen. Blueprints of DevSecOps Foundations to Fortify Your Cloud. Naveen Pakalapati, 2023.

[6] Shaik, Babulal. "Developing Predictive Autoscaling Algorithms for Variable Traffic Patterns." Journal of Bioinformatics and Artificial Intelligence 1.2 (2021): 71-90.

[7] Mulder, Jeroen. Multi-Cloud Strategy for Cloud Architects: Learn how to adopt and manage public clouds by leveraging BaseOps, FinOps, and DevSecOps. Packt Publishing Ltd, 2023.

[8] Balkishan Arugula, and Vasu Nalmala. “Migrating Legacy Ecommerce Systems to the Cloud: A Step-by-Step Guide”. Los Angeles Journal of Intelligent Systems and Pattern Recognition, vol. 3, Dec. 2023, pp. 342-67

[9] Jani, Parth. “Embedding NLP into Member Portals to Improve Plan Selection and CHIP Re-Enrollment”. Newark Journal of Human-Centric AI and Robotics Interaction, vol. 1, Nov. 2021, pp. 175-92

[10] Mishra, Sarbaree, et al. “A Domain Driven Data Architecture for Improving Data Quality in Distributed Datasets”. International Journal of Emerging Trends in Computer Science and Information Technology, vol. 2, no. 3, Oct. 2021, pp. 81-90

[11] Bayya, Anil Kumar. "Cutting-Edge Practices for Securing APIs in FinTech: Implementing Adaptive Security Models and Zero Trust Architecture." International journal of applied engineering and technology (London) 4 (2022): 279-298.

[12] Guntupalli, Bhavitha, and Surya Vamshi ch. “Designing Microservices That Handle High-Volume Data Loads”. International Journal of AI, BigData, Computational and Management Studies, vol. 4, no. 4, Dec. 2023, pp. 76-87

[13] Shmeleva, Ekaterina. "How microservices are changing the security landscape." (2020).

[14] Manda, Jeevan Kumar. "Privacy-Preserving Technologies in Telecom Data Analytics: Implementing Privacy-Preserving Techniques Like Differential Privacy to Protect Sensitive Customer Data During Telecom Data Analytics." Available at SSRN 5136773 (2023).

[15] Vasanta Kumar Tarra. “Claims Processing & Fraud Detection With AI in Salesforce”. JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING ( JRTCSE), vol. 11, no. 2, Oct. 2023, pp. 37–53

[16] Smith, Bridger A. A DEVSECOPS APPROACH FOR DEVELOPING AND DEPLOYING CONTAINERISED CLOUD-BASED SOFTWARE ON SUBMARINES. Diss. Monterey, CA; Naval Postgraduate School, 2021.

[17] Mishra, Sarbaree. “Comparing Apache Iceberg and Databricks in Building Data Lakes and Mesh Architectures”. International Journal of AI, BigData, Computational and Management Studies, vol. 3, no. 4, Dec. 2022, pp. 37-48

[18] Mohammad, Abdul Jabbar, and Seshagiri Nageneini. “Temporal Waste Heat Index (TWHI) for Process Efficiency”. International Journal of Emerging Research in Engineering and Technology, vol. 3, no. 1, Mar. 2022, pp. 51-63

[19] Allam, Hitesh. "Declarative Operations: GitOps in Large-Scale Production Systems." International Journal of Emerging Trends in Computer Science and Information Technology 4.2 (2023): 68-77.

[20] Talakola, Swetha. “Leverage Microsoft Power BI Reports to Generate Insights and Integrate With the Application”. International Journal of AI, BigData, Computational and Management Studies, vol. 3, no. 2, June 2022, pp. 31-40

[21] Mishra, Sarbaree, et al. “Leveraging In-Memory Computing for Speeding up Apache Spark and Hadoop Distributed Data Processing”. International Journal of Emerging Research in Engineering and Technology, vol. 3, no. 3, Oct. 2022, pp. 74-86

[22] Datla, Lalith Sriram. “Optimizing REST API Reliability in Cloud-Based Insurance Platforms for Education and Healthcare Clients”. International Journal of Artificial Intelligence, Data Science, and Machine Learning, vol. 4, no. 3, Oct. 2023, pp. 50-59

[23] Abdul Jabbar Mohammad. “Leveraging Timekeeping Data for Risk Reward Optimization in Workforce Strategy”. Los Angeles Journal of Intelligent Systems and Pattern Recognition, vol. 4, Mar. 2024, pp. 302-24

[24] Bird, Jim, and Eric Johnson. "A SANS survey: rethinking the Sec in DevSecOps: Security as Code." SANS Institute Reading Room, SANS Institute (2021).

[25] Guntupalli, Bhavitha. “Data Lake Vs. Data Warehouse: Choosing the Right Architecture”. International Journal of Artificial Intelligence, Data Science, and Machine Learning, vol. 4, no. 4, Dec. 2023, pp. 54-64

[26] Veluru, Sai Prasad. "Leveraging AI and ML for Automated Incident Resolution in Cloud Infrastructure." International Journal of Artificial Intelligence, Data Science, and Machine Learning 2.2 (2021): 51-61.

[27] Immaneni, J. (2022). Strengthening Fraud Detection with Swarm Intelligence and Graph Analytics. International Journal of Digital Innovation, 3(1).

[28] Mishra, Sarbaree, and Jeevan Manda. “Building a Scalable Enterprise Scale Data Mesh With Apache Snowflake and Iceberg”. International Journal of Emerging Research in Engineering and Technology, vol. 4, no. 2, June 2023, pp. 95-105

[29] Sirigina, Praveen Varma. "Digital Payment Security: A Developer Framework." (2023).

[30] Shaik, Babulal. "Automating Compliance in Amazon EKS Clusters With Custom Policies." Journal of Artificial Intelligence Research and Applications 1.1 (2021): 587-10.

[31] Chaganti, Krishna Chaitanya. "The Role of AI in Secure DevOps: Preventing Vulnerabilities in CI/CD Pipelines." International Journal of Science And Engineering 9.4 (2023): 19-29.

[32] Nookala, G. (2023). Secure multiparty computation (SMC) for privacy-preserving data analysis. Journal of Big Data and Smart Systems, 4(1).

[33] Mohammad, Abdul Jabbar. “Dynamic Labor Forecasting via Real-Time Timekeeping Stream”. International Journal of AI, BigData, Computational and Management Studies, vol. 4, no. 4, Dec. 2023, pp. 56-65

[34] SOLANKE, ADEDAMOLA ABIODUN. "Enterprise DevSecOps: Integrating security into CI/CD pipelines for regulated industries." (2022).

[35] Manda, J. K. "Data privacy and GDPR compliance in telecom: ensuring compliance with data privacy regulations like GDPR in telecom data handling and customer information management." MZ Comput J 3.1 (2022).

[36] Mishra, Sarbaree. “Scaling Rule Based Anomaly and Fraud Detection and Business Process Monitoring Through Apache Flink”. International Journal of AI, BigData, Computational and Management Studies, vol. 4, no. 1, Mar. 2023, pp. 108-19

[37] Arugula, Balkishan. “AI-Powered Code Generation: Accelerating Digital Transformation in Large Enterprises”. International Journal of AI, BigData, Computational and Management Studies, vol. 5, no. 2, June 2024, pp. 48-57

[38] Datla, Lalith Sriram, and Rishi Krishna Thodupunuri. "Designing for Defense: How We Embedded Security Principles into Cloud-Native Web Application Architectures." International Journal of Emerging Research in Engineering and Technology 2.4 (2021): 30-38.

[39] Mohammad, Abdul Jabbar. “Predictive Compliance Radar Using Temporal-AI Fusion”. International Journal of AI, BigData, Computational and Management Studies, vol. 4, no. 1, Mar. 2023, pp. 76-87

[40] Shaik, Babulal. "Network Isolation Techniques in Multi-Tenant EKS Clusters." Distributed Learning and Broad Applications in Scientific Research 6 (2020).

[41] Balkishan Arugula. “Personalization in Ecommerce: Using AI and Data Analytics to Enhance Customer Experience”. Artificial Intelligence, Machine Learning, and Autonomous Systems, vol. 7, Sept. 2023, pp. 14-39

[42] Edmundson, Chris, and Kenneth G. Hartman. "SANS 2022 DevSecOps Survey: Creating a Culture to Significantly Improve Your Organization’s Security Posture." URL https://www. sans. org/white-papers/sans-2022-devsecops-survey-creating-cultureimprove-organization-security (2022).

[43] Patel, Piyushkumar. "Bonus Depreciation Loopholes: How High-Net-Worth Individuals Maximize Tax Deductions." Distributed Learning and Broad Applications in Scientific Research 5 (2019): 1405-19.

[44] Nookala, G. (2023). Serverless Data Architecture: Advantages, Drawbacks, and Best Practices. Journal of Computing and Information Technology, 3(1).

[45] Tortoriello, Valentina. Definition of a DevSecOps Operating Model for software development in a large Enterprise. Diss. Politecnico di Torino, 2022.

[46] Guntupalli, Bhavitha. “ETL Architecture Patterns: Hub-and-Spoke, Lambda, and More”. International Journal of AI, BigData, Computational and Management Studies, vol. 4, no. 3, Oct. 2023, pp. 61-71

[47] Allam, Hitesh. “Unifying Operations: SRE and DevOps Collaboration for Global Cloud Deployments”. International Journal of Emerging Research in Engineering and Technology, vol. 4, no. 1, Mar. 2023, pp. 89-98

[48] Abdul Jabbar Mohammad. “Integrating Timekeeping With Mental Health and Burnout Detection Systems”. Artificial Intelligence, Machine Learning, and Autonomous Systems, vol. 8, Mar. 2024, pp. 72-97

[49] Jani, Parth, and Sangeeta Anand. “Apache Iceberg for Longitudinal Patient Record Versioning in Cloud Data Lakes”. Essex Journal of AI Ethics and Responsible Innovation, vol. 1, Sept. 2021, pp. 338-57

[50] Tan, Junsheng. "Ensuring component dependencies and facilitating documentation by applying Open Policy Agent in a DevSecOps cloud environment." (2022).

[51] Datla, Lalith Sriram. “Proactive Application Monitoring for Insurance Platforms: How AppDynamics Improved Our Response Times”. International Journal of Emerging Research in Engineering and Technology, vol. 4, no. 1, Mar. 2023, pp. 54-65

[52] Patel, Piyushkumar. "The Role of AI in Forensic Accounting: Enhancing Fraud Detection through Machine Learning." Distributed Learning and Broad Applications in Scientific Research 5 (2019): 1420-35.

[53] Kamau, Eunice, et al. "Advances in Full-Stack Development Frameworks: A Comprehensive Review of Security and Compliance Models." (2023).

[54] Sreekandan Nair , S. (2023). Digital Warfare: Cybersecurity Implications of the Russia-Ukraine Conflict. International Journal of Emerging Trends in Computer Science and Information Technology, 4(4), 31-40. https://doi.org/10.63282/7a3rq622

Downloads

Published

2024-10-30

Issue

Section

Articles

How to Cite

1.
Allam K. Secure Banking Microservices on AWS: A DevSecOps Framework. IJERET [Internet]. 2024 Oct. 30 [cited 2025 Oct. 26];5(3):73-8. Available from: https://ijeret.org/index.php/ijeret/article/view/238