Engineering Resilient Financial Ecosystems: An Autonomic Framework for Zero-Trust Cloud Architecture and Automated Governance
DOI:
https://doi.org/10.22399/ijcesen.5061Keywords:
CNP, ZTA, CSMA, HFT, Real TimeAbstract
Global financial institutions increasingly rely on Cloud-Native Platforms (CNPs) to support high-frequency trading (HFT), real-time settlement processing, cross-border transfers, and large-scale customer-facing applications. This accelerated migration introduces architectural and operational risks, particularly as traditional perimeter-based security models fail under the dynamism and scale of modern cloud environments. This research introduces a novel, unified Autonomic Zero-Trust Governance Framework (AZTGF), providing a first-of-its-kind integration of self-governing mechanisms with Cybersecurity Mesh Architecture to secure systemic financial infrastructures. By embedding autonomic mechanisms—self-configuration, self-optimization, self-healing, and self-protection—into the financial data plane, institutions can maintain velocity without compromising security. The framework demonstrates how automated certificate and identity lifecycle systems can proactively mitigate outages, reduce operational overhead, and counteract configuration drift. These contributions collectively advance the capabilities of cloud-native financial infrastructures to withstand emergent threats in complex, distributed environments.
References
[1] Carter, K., Kim, T., & Carbone, N. (2021). Zero Trust Architecture for Cloud-Native Environments. Journal of Cybersecurity, 8(1), 1–15.
[2] Firstbrook, P. (2021). Cybersecurity Mesh Architecture: Decentralized Security for Modern Enterprises. Gartner Research Journal, 23(4), 44–52.
[3] Kephart, J., & Chess, D. (2003). The Vision of Autonomic Computing. Computer, 36(1), 41–50.
[4] Kephart, J., & Walsh, W. (2004). An Artificial Intelligence Perspective on Autonomic Computing Policies. IBM Systems Journal, 42(1), 1–14.
[5] Khan, S., & Khan, A. (2022). Adoption of Cloud-Native Architectures in Financial Institutions: Opportunities and Risks. International Journal of Financial Systems Engineering, 9(2), 122–140.
[6] Mahmoudi, A., Zhou, Y., & Zulkernine, M. (2022). Autonomic Security for Cloud Environments: A Survey of Self-Protecting Software. ACM Computing Surveys, 54(11), 1–36.
[7] NIST (2020). Zero Trust Architecture (SP 800-207). National Institute of Standards and Technology.
[8] Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture (NIST Special Publication 800-207). National Institute of Standards and Technology.
[9] Sarkar, S., Choudhary, G., Shandilya, S. K., Hussain, A., & Kim, H. (2022). Security of zero trust networks in cloud computing: A comparative review. Sustainability, 14(18), 11213.
[10] Agrawal, N., Rawat, S., Khatri, S. K., & Nehra, R. (2021). Autonomic cloud computing based management and security solutions: State-of-the-art, challenges, and opportunities. Transactions on Emerging Telecommunications Technologies, 32(12), e4349. https://doi.org/10.1002/ett.4349
[11] Gill, S. S. (2015). Autonomic cloud computing: Research perspective. arXiv Preprint, arXiv:1507.01546.
[12] Khoda Parast, F., Agarwal, V., Kaushal, A. K., & Chouhan, L. (2022). Cloud computing security: A survey of service-based models. Computers & Security, 114, 102580.
[13] Tahirkheli, A. I., Jalil, Z., Rehman, M. H., & Alhumaidi, H. (2021). A survey on modern cloud computing security over smart city and IoT. Electronics, 10(15), 1811. https://doi.org/10.3390/electronics10151811
[14] Cloud Native Computing Foundation (CNCF) TAG Security. (2020). Cloud Native Security Whitepaper v1. Cloud Native Computing Foundation.
[15] Capgemini. (2022). Cloud Native Comes of Age in Banking. Capgemini Financial Services Insights.
[16] Kodakandla, N. (2022). GitOps: Why it’s becoming the gold standard for infrastructure management. TIJER International Research Journal, 9(10), 1–6.
[17] Qualys Inc. (2021). 2021 Cloud Security Report. Qualys Research.
[18] AppViewX. (2021). Global 2000 Bank Eliminates Certificate-Related Outages. AppViewX Case Study.
[19] CyberArk. (2020). True Tales of 8 Certificate Outages: How to Avoid Certificate Disruption, Distraction & Downtime. CyberArk Machine Identity Security Brief.
[20] Skandylas, C., Pretschner, A., & Braberman, V. (2021). Design and analysis of self-protection: Adaptive security for self-adaptive systems. Journal of Systems and Software, 176, 110932.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.