Looding...

Comprehensive Cloud Security Evaluation

Financial Services Banking & Financial Services
case study

Business Impacts

Reduced risk of unauthorized access and data breaches

Enhanced compliance and customer trust

Minimized operational disruptions

Customer Key Facts

  • Country : New York, USA
  • Industry : Financial services and insurance industry

Problem Context

Client is an American financial services company operateing 1680 branches throughout the US,
Client needed help in –

  1. Identify security gaps and vulnerabilities, perform analysis of their exisiting GC environment and categorize the vulnerabilities on their risk levels
  2.  Provide detailed remediation plans and recommendations / best practices to enhance the overall security posture

Challenges

  • Lack of defined organization policies and governance control
  • No proper access control based on department, team, and access roles
  • Default VPC configuration leading to potential security vulnerabilities
  • Unable to track data usage and security
  • Data retention and management
  • Limited visibility into system activities due to undefined data and audit logs
  • Ineffective threat detection and response

Technologies Used

Cloud Security Command Centre Premium

Cloud Security Command Centre Premium

Cloud Audit Logs

Cloud Audit Logs

Cloud Data Loss Prevention

Cloud Data Loss Prevention

Identity & Access Management

Identity & Access Management

Dialogflow

Dialogflow

VPC service controls

VPC service controls

Cloud Identity

Cloud Identity

Solution

  • Quantiphi implemented a robust authentication and access policies.
  • Enabled Multi-Factor Authentication (MFA), implemented key-based access controls, defined user groups, and configured audit logs.
  • Streamlined access management through custom roles that granted the minimum required permissions.
  • Provided immediate remediation solutions focusing on improving design, architecture and configuration settings

Results

  • Improved security posture with strong authentication and access policies and reduced unauthorized access risks.
  • Enhanced access management and minimized attack surface.
  • Recommendations based on prioritized security implementation.
  • Compliance with Google Cloud best practices to establish a robust security foundation.

Thank you for reaching out to us!

Our experts will be in touch with you shortly.

In the meantime, explore our insightful blogs and case studies.

Something went wrong!

Please try it again.

Share