The fintech ecosystem is flourishing and exciting things are happening these days at the intersection of digital technology and financial services – thanks in part to an infusion of global fintech investment that reached US$98 billion across 2,456 deals in H1’21. This far outpaces last year’s annual total of $121.5 billion across 3,520 deals.
Fintech companies are creating and rolling out a wide range of solutions that are impacting nearly everyone, dramatically broadening the reach, flexibility, and level of innovation in financial services. In addition, technology is helping enable enormous progress in bringing financial services to the many people who have previously been excluded from the formal financial system.
The rapid growth of an ecosystem comes with its own set of challenges. One of the key challenges for the fintech revolution is cybersecurity. According to a cybersecurity report by Boston Consulting Group, banking and financial institutions are 300 times more at risk of cyberattack than other companies.
In their latest report, the European Central Bank identified the main risk factors that the eurozone banking system is expected to face over the next three years. These risks are increasing with the continued digitization of financial services, the obsolescence of certain banking information systems and the interconnection with third-party information systems.
Given the complexity of the digital financial ecosystem, it is inevitable that some solutions will be insufficiently secure against cyberattacks. And it’s highly likely that those vulnerabilities will be found and exploited. In addition to causing immediate financial losses, breaches can undermine longer term confidence in new solutions, leading to lower adoption rates particularly among users with less experience engaging with digital services. The gap between technology and regulation is acute in fintech and particularly so, with respect to cybersecurity in the fintech context. This is the inevitable result of mixing solutions that are evolving at a rapid pace with regulatory frameworks that change far more slowly.
There will be more interfaces between traditional financial service providers and fintech startups, and therefore, more cyber vulnerabilities as data crosses those interfaces.
As fintech startups grow in number and sophistication, they will establish an increasing number of links with traditional providers through Application Programming Interfaces (APIs). Interfaces between systems are a common source of cyber vulnerabilities arising from mismatched assumptions made by the designers of the systems being connected. To help guard against this, interfaces between digital financial systems should be subject to particularly stringent scrutiny and testing during the product development process, including by people who can take a clean-slate, holistic view of the aggregated system.
An operating system that provides security controls, such as continuous vulnerability patching, malware defenses, secure configuration and hardening, will take fintechs a long way towards reducing the risk of security incidents or breaches.
Ubuntu, the most popular platform among experienced developers and the most widely deployed platform on the public cloud, provides all the above security controls to fintechs and finservs. Ubuntu is designed to provide minimal attack surface, with no open ports by default. It also has one of the smallest container images among enterprise operating systems. It incorporates state-of-the-art malware protection and anti-exploitation mechanisms, such as Address space layout randomization (ASLR), heap and stack protection, non-executable memory, Unified Extensible Firmware Interface (UEFI) secure boot and others as explained on Ubuntu’s security pages.
Furthermore, Ubuntu includes AppArmor, a simple-to-use and easy-to-understand application confinement framework, enabling the confinement of applications by the operator. AppArmor is the engine behind our snap application management system, which enables organisations to run third- party applications confined and isolated, thus decoupling the security of the operating system from that of individual applications.
Given that vulnerability management is fundamental to any cybersecurity program, Ubuntu’s vulnerability disclosure policy is transparent, and machine readable (OVAL) data is provided to enable the audit of vulnerabilities on Ubuntu. Furthermore, Canonical ensures timely fixes and ships the necessary tools like OpenSCAP to enable automated workflows, such as vulnerability scanning, compliance audits and remediation.
Hardening always involves a tradeoff with usability and performance. The default configuration of Ubuntu LTS releases, as provided by Canonical, balances usability, performance and security. However, systems with dedicated workloads and deployments that are targeting specific platforms or clouds can benefit from hardening. Profiles such as the CIS benchmark enable a hardened operating system that follows the CIS Controls guidance. Canonical works with CIS as well as DISA to enable them to create guides and rules for their respective CIS benchmarks and DISA-STIG.
Canonical ensures that the Ubuntu operating system is third-party attested. Cryptographic core packages in Ubuntu are regularly certified under NIST’s FIPS 140-2 program. The security mechanisms of the operating system are further certified under the Common Criteria Operating System Protection Profile (OSPP) on the EAL2 level. The Common Criteria (CC) for Information Technology Security Evaluation is an international standard (ISO/IEC IS 15408) for computer security certification used by financial institutions and many other organizations dealing with sensitive data.
Read this white paper to learn more about security frameworks and how they can benefit your business.
While Canonical’s free standard maintenance of Ubuntu Long Term Release (LTS) is sufficient for many users, Ubuntu Advantage and Ubuntu Pro address financial institutions’ enterprise security needs.
Ubuntu Advantage and Ubuntu Pro provide your organization the necessary tools to comply with cybersecurity requirements by tackling vulnerability management in the long term for the operating system and applications, audit and compliance tooling for secure configuration and hardening, such as CIS benchmarks, as well as third party attestation of the security mechanisms with Common Criteria and a FIPS140-2 validated cryptographic core.
Photo by Alexander Schimmeck on Unsplash
Canonical’s Kubernetes LTS (Long Term Support) will support FedRAMP compliance and receive at least 12…
Welcome to the Ubuntu Weekly Newsletter, Issue 878 for the week of February 2 –…
At Canonical, we firmly believe that delivering an outstanding, customer-centric support experience is impossible without…
I want to share how to install osTicket v1.14 for Ubuntu 20.04 server. osTicket written…
Now I want to share how to install WordPress on ubuntu 20.04 server. WordPress is…
Now I want to share the DNS server installation process on your Ubuntu 20.04 server.…