t cht lk multiple cloud platforms . Indeed , according to one report , 92 % of enterprises had a multi-cloud strategy during the past year .
t cht lk multiple cloud platforms . Indeed , according to one report , 92 % of enterprises had a multi-cloud strategy during the past year .
Deploying workloads across multiple public clouds can be particularly useful for organizations in highly regulated industries like financial services . It can assist them in meeting compliance-based data sovereignty and availability requirements by ensuring that sensitive information is stored in the right jurisdiction and that systems remain up-and-running even if one provider fails .
Following a multi-cloud strategy also enables banks to take advantage of best-of-breed capabilities offered by specific providers . It also helps to mitigate the risk of vendor lock-in which may also be a concern for regulators .
As multi-cloud has grown in popularity , so have containers and microservices which offer a vehicle in which to run workloads across these different cloud environments . In many cases , it is Kubernetes that is used as the de facto system for automating , deploying and managing these containers .
Often , financial services companies are choosing to run them not just in a single cluster but in multiple clusters ( and across multiple cloud environments ) to reduce vendor lock-in , enhance performance and improve availability and resiliency .
However , at the same time , government and financial regulations also require businesses to assert a level of control over these environments in order to mitigate cyber-risk . This should include not only human identity and access management , but also managing the digital certificates and keys that comprise machine identities .
Machine identities can relate to anything from devices and workloads to applications , containers and clusters . Any failure to keep these identities up-to-date and secure the machines with which they are linked can become vulnerable to hijacking and exploitation . This , in turn , can potentially lead to data breaches , ransomware , and crypto-jacking .
This is because machine identities effectively secure and encrypt communications between these cloud assets . Fail in this , and financial services organizations
76 INTELLIGENTCIO APAC www . intelligentcio . com