DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Last call! Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

Related

  • When Technology Broke and How We Fixed It (The Evolution of APIs)
  • Unlocking the Benefits of a Private API in AWS API Gateway
  • API and Security: From IT to Cyber
  • Securely Sign and Manage Documents Digitally With DocuSign and Ballerina

Trending

  • The Modern Data Stack Is Overrated — Here’s What Works
  • Comparing SaaS vs. PaaS for Kafka and Flink Data Streaming
  • Building Scalable and Resilient Data Pipelines With Apache Airflow
  • Apache Doris vs Elasticsearch: An In-Depth Comparative Analysis
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. Misconfiguration Madness: Thwarting Common Vulnerabilities in the Financial Sector

Misconfiguration Madness: Thwarting Common Vulnerabilities in the Financial Sector

Financial services are among the most attacked sectors of any industry, making it critical that developers operate at the highest level to produce secure code.

By 
Matias Madou user avatar
Matias Madou
·
Oct. 02, 24 · Analysis
Likes (2)
Comment
Save
Tweet
Share
3.7K Views

Join the DZone community and get the full member experience.

Join For Free

Ever since people started putting their money into banks and financial institutions, other people have sought to steal those deposits or otherwise fraudulently obtain those protected assets. When someone asked infamous 1920s-era bank robber Willie Sutton why he robbed banks, he simply replied, “Because that’s where the money is.” 

Today, much of the money held by banks and other financial institutions is in digital form, and many of the sensitive records held by those firms can be just as valuable as the digital currency itself. But the reasons behind the targeting of financial institutions by threat actors remain much the same as they were in Sutton’s time over 100 years ago: that’s where the money — and at least some valuable personal data — is kept.

As such, the financial services sector is increasingly embattled when it comes to cyberattacks. According to Verizon’s Data Breach Investigations Report, banks saw a 238% increase in attacks in 2022 from the previous year. And many of those attacks were successful, resulting in an average of $5.9 million in cleanup costs per incident according to IBM’s 2023 Cost of a Data Breach Report. And that does not account for any actual money lost or stolen.

Why Banks and Financial Institutions Make Tempting Targets

While the physical security at many banks today is impressive, with huge vaults, bullet-proof glass, silent holdup alarms, guards, and things like exploding dye packets ready to make strongarm robberies much more difficult, it’s often a different story when it comes to cybersecurity. Yes, many banks have invested in modernizing their public-facing applications, but those often need to run in tandem with 50-year-old applications and systems written in comparatively ancient computer languages like COBOL, which are long past being actively supported or updated.

The business environment itself can also make cybersecurity a challenge, especially for larger institutions, which are subject to state, national, international, and industry mandates, laws, and standards. That makes for a complex business environment that is difficult to protect without running afoul of different regulatory requirements. And adding more fuel to an already challenging fire, in recent years, financial service institutions (FSIs) have also had to deal with increasingly distributed and hybrid workforces, which significantly expands the potential attack surface and adds yet another wrinkle to the challenge of cybersecurity.

Finally, cyberattacks on banks, when successful, tend to be rather potent. For example, during the 2017 data breach affecting Equifax, 187 million customers — or more than 40% of the United States population — were potentially affected by the large-scale data theft.

In fact, many reports say that cyberattacks on banks are devastating the entire financial sector.

Protecting Financial Institutions

Financial institutions require legions of skilled security personnel in order to overcome the many challenges facing their industry. Developers are an especially important part of that elite cadre of defenders for a variety of reasons. First and foremost, security-aware developers can write secure code for new applications, which can thwart attackers by denying them a foothold in the first place. If there are no vulnerabilities to exploit, an attacker won't be able to operate, at least not very easily.

Developers with the right training can also help to support both modern and legacy applications by examining the existing code that makes up some of the primary vectors used to attack financial institutions. That includes cloud misconfigurations, lax API security, and the many legacy bugs found in applications written in COBOL and other aging computer languages.

However, the task of nurturing and maintaining security-aware developers in the financial sector won’t happen on its own. It requires precise, immersive training programs that are highly customizable and matched to the specific complex environment that a financial services institution is using.

That training regimen also requires significant flexibility so that developers can learn about the most modern aspects of cybersecurity — for example, how to eliminate API vulnerabilities — while also providing support for legacy languages like COBOL. It should also be hands-on, allowing developers to “learn by doing” in continuous contextual bursts that match what they will find in the real financial services environment they are supporting.

A Bright Future for Software Security in the Financial Services Sector

The financial services sector is always going to be one of the most attacked of any industry. That was true back when people first started using banks and is still true today. With a challenging regulatory landscape and a complex business environment, it might at first seem impossible to stop the majority of those attacks.

However, it is also one of the verticals most willing to try new cyber defense strategies and more modern training techniques. In my close workings with global financial institutions, I have experienced first-hand how receptive their security leaders can be to learning programs that align developers and AppSec professionals to common security goals and approach secure coding, in particular, with empathy for developers and how they experience security in their workflow. One US-based institution selected an upskilling solution for their cohort that allowed them to run inter-team tournaments and test the knowledge they had built, while also providing a framework for evaluating new and prospective hires, and applying key learning pathways accordingly. This eventually led to a developer-driven — yet executive-endorsed — security champions program that helped each person touching code in their organization keep security front-of-mind.

Many FSI enterprises understand the immense value of having a core of security-aware developers trained in everything from modern cloud and API security to the perils found in legacy systems. They can level the playing field and deny cyberattackers room to maneuver. That requires both a highly flexible and customizable training regimen and the creation of a cohesive security culture.

By providing that kind of training alongside things like incentives for security champions and privilege-based initiatives where only the best, most security-aware developers who have completed their training are allowed to work with critical assets, financial services firms can create a bulwark against even the most determined attackers. And yes, they can keep their data, users, and digital money safe, even in the face of these unprecedented, challenging times.

API COBOL Data theft Personal data security

Opinions expressed by DZone contributors are their own.

Related

  • When Technology Broke and How We Fixed It (The Evolution of APIs)
  • Unlocking the Benefits of a Private API in AWS API Gateway
  • API and Security: From IT to Cyber
  • Securely Sign and Manage Documents Digitally With DocuSign and Ballerina

Partner Resources

×

Comments
Oops! Something Went Wrong

The likes didn't load as expected. Please refresh the page and try again.

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends:

Likes
There are no likes...yet! 👀
Be the first to like this post!
It looks like you're not logged in.
Sign in to see who liked this post!