Strengthen Identity and Access Controls in Cloud Environments
Misconfigurations remain one of the biggest cloud security risks for financial services organizations. Lister says permissive firewall rules, overprivileged identity and access management permissions and inconsistent security policies across hybrid environments are among the most common mistakes institutions make when configuring cloud environments.
“To help, apply the least privilege principle. For example, in Google Cloud, IAM Recommender analyzes user permissions and makes suggestions for removing unused permissions, which can help — in case an attacker successfully phishes a user — by limiting the damage potential to only what the user needed to do their job,” Lister says.
For financial institutions subject to strict regulatory oversight, strong identity governance is essential. Multifactor authentication, role-based access controls and continuous monitoring can help organizations reduce risk exposure while maintaining compliance with evolving financial regulations.
CHECK OUT: BizTech’s coverage of this year’s Google Cloud Next event in Las Vegas.
Financial services organizations must also clearly understand their role in the shared-responsibility model. Some leaders assume that because a cloud provider secures infrastructure, applications and workloads running in the cloud are automatically protected.
However, Google Cloud’s latest Cloud Threat Horizons Report found that “threat actors are increasingly focusing on software-based entry over stolen credentials as a primary initial access vector into cloud environments,” Lister notes. In the latter half of 2025, 44.5% of observed initial access vectors exploited were through third-party software-based entry, while weak or absent credential entry accounted for 27.2%.
“To help block threat actors trying to exploit software vulnerabilities on any cloud platform, we recommend businesses pivot from manual security triaging to automated defenses, such as implementing identity-centric proxies, which can block threat actors at the proxy because they cannot provide a valid, authorized identity,” Lister adds.
Financial Services Organizations Must Prioritize Cyber Resilience
As cyberattacks against banks and financial institutions continue to increase, IT leaders must carefully prioritize cloud security investments while balancing modernization goals, compliance demands and budget constraints.
Because identity compromise remains a leading cause of cloud breaches, Lister recommends prioritizing phishing-resistant multifactor authentication and replacing static credentials with tamper-resistant logging to improve forensic readiness.
Hybrid and multicloud strategies can also create fragmented identity perimeters across financial services environments. To address these challenges, Lister recommends adopting context-aware access controls that require device health verification before granting access to sensitive financial data or customer records.
READ MORE: Financial services organizations face cyberthreats that originate inside the cloud.
Organizations should also work toward unified visibility and standardized forensics through the OSDFIR infrastructure framework, which Lister says is “essential for maintaining a consistent security posture and incident response capability across all platforms.”
For financial services organizations, maintaining resilience is no longer just about preventing breaches. IT leaders must also focus on rapid detection, coordinated response and operational continuity to protect customer trust and support digital transformation initiatives.
As cloud adoption continues to expand across the financial services industry, organizations that prioritize identity security, automated defenses and visibility across hybrid environments will be better positioned to reduce risk and strengthen long-term resilience.
