Talks AWS re:Invent 2025 - Fast and compliant CI/CD pipelines in the financial industry (IND217) VIDEO
AWS re:Invent 2025 - Fast and compliant CI/CD pipelines in the financial industry (IND217) Secure and Compliant CI/CD Pipelines for the Financial Industry
Supply Chain Attacks: The Top Risk for Banks in 2025
75% of enterprise organizations have experienced a supply chain attack in the past 12 months
Attackers target CI/CD pipelines to inject malicious code that gets deployed to production
This poses major risks for banks and financial institutions, including large fines and reputational damage
The Danger of Deployment Drift Windows
Modern CI/CD pipelines often have long "drift windows" between build and deployment
During this time, artifacts can sit idle for days or weeks, increasing the risk of tampering or vulnerabilities
Multiple drift windows exist in a typical release cycle (dev, QA, staging, production)
This "danger zone" must be secured to prevent supply chain attacks
The Three Pillars of a Zero-Trust Pipeline
Software Bill of Materials (SBOM) : A complete list of third-party components and libraries used to build the application
Provenance : The "who, what, when, where, and how" of the artifact creation process
Attestation : Cryptographic proof that links the SBOM and provenance to the deployed artifact
These three elements work together to provide a secure chain of trust from build to deployment
Separation of Duties: GitHub Actions and Octopus Deploy
GitHub Actions handles the CI side: building, testing, scanning, and publishing artifacts
Octopus Deploy manages the CD side: verifying SBOM and attestations, enforcing policies, and deploying to production
This clear separation of responsibilities ensures a secure, zero-trust pipeline
Octopus Deploy: Verifying and Governing Deployments
Octopus Deploy verifies the SBOM, attestations, and artifact integrity before deployment
It also applies compliance policies, checks for vulnerabilities, and tracks Kubernetes object status
This provides a comprehensive governance framework for regulated industries like finance
Real-World Example: Deploying the Account Registry Application
GitHub Actions workflow:
Scans repository, builds container, generates SBOM and attestations
Signs and publishes artifacts to package repository
Octopus Deploy:
Retrieves packages, verifies SBOM and attestations
Compares hashes to ensure artifact integrity
Checks for vulnerabilities using the GitHub API
Applies compliance policies and deploys to EKS
Key Takeaways
Established a secure chain of trust from build to deploy using SBOM, provenance, and attestations
Enforced deployment governance through policy evaluation, vulnerability checks, and artifact validation
Verified the integrity of deployed artifacts to ensure they were not tampered with
Demonstrated a practical, real-world example of a zero-trust CI/CD pipeline for a financial application
Your Digital Journey deserves a great story. Build one with us.