{"id":11063,"date":"2020-09-02T11:59:45","date_gmt":"2020-09-02T11:59:45","guid":{"rendered":"https:\/\/codeandpepper.com\/?p=11063"},"modified":"2023-12-21T09:51:54","modified_gmt":"2023-12-21T09:51:54","slug":"fintech-security-standards-and-requirements","status":"publish","type":"post","link":"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/","title":{"rendered":"Essential Security Standards and Requirements for FinTech Apps"},"content":{"rendered":"\n<p>In the UK, FinTech apps should be handled in a way similar to banking institutions, both from the legal and technological point of view. It obviously imposes a lot of responsibility and work to ensure the system is 100% secure, so users can trust it with their money. But what does it mean in practice? Let\u2019s take a deeper look at the <strong>FinTech security standards<\/strong> you\u2019ll need to deal with in order to abide by the rules, while still being able to offer the most to your customers.<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-fintech-security-requirements-legal-perspective\">FinTech security requirements: legal perspective&nbsp;<\/h2>\n\n\n\n<p>No matter if there\u2019s more <em>fin <\/em>or more <em>tech<\/em> in a FinTech app, there is no way to escape the regulations. Since there are no special laws regarding this type of products, they are all subject to the existing body of UK financial regulatory perimeter. This fact places FinTechs among institutions providing consumer credits, insurance services, crowdfunding and banking, and, as a result, ensures that the final customer can actually feel safe.<\/p>\n\n\n\n<p>Moreover, there is a plethora of <strong>cyber security rules<\/strong>, which in the UK are mostly <a href=\"https:\/\/iclg.com\/practice-areas\/fintech-laws-and-regulations\/united-kingdom\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">compatible with their counterparts in the EU<\/a>. Top 3 are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>personal data protection (including breach notification)<\/li><li>mandatory security measures (their absence can cause the FCA to take action)<\/li><li>the Computer Misuse Act 1990 (amended in 2015, as a part of the EU Cybercrime Directive)<\/li><\/ul>\n\n\n\n<p>The major difference between the UK and EU in terms of legal regulations regarding FinTech is that the UK\u2019s Network and Information Systems Regulations 2018 don&#8217;t apply to banks and financial institutions (although they should, according to the <a href=\"https:\/\/www.legislation.gov.uk\/eudr\/2016\/1148\/introduction\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Network and Information Systems Directive, (EU) 2016\/1148<\/a>). However, the reason for excluding the finance sector from this law is that <b>it was considered sufficiently regulated in the first place.<\/b><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-fintech-security-standards-technology-perspective\"><strong>FinTech security standards: technology perspective<\/strong><\/h2>\n\n\n\n<p>Besides the binding law, cyber security is a number one priority for every business in the financial sector for a number of reasons. And while minimizing the risk of losing funds to hackers is a must, maintaining a good reputation, is almost as important. In fact, information about security breaches going public often end up as stock market disasters. Probably the worst one happened in 2016, when Yahoo was sold in, what the media called, \u201c<a href=\"https:\/\/www.forbes.com\/sites\/briansolomon\/2016\/07\/25\/yahoo-sells-to-verizon-for-5-billion-marissa-mayer\/\" target=\"_blank\" rel=\"noreferrer noopener\">the saddest $5 billion deal in tech history<\/a>.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-basic-fintech-security-solutions\">Basic FinTech security solutions&nbsp;<\/h2>\n\n\n\n<p>In order to make sure your business is as safe and responsible as possible, you should start with five essentials:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-dedicated-cyber-security-team\">1. Dedicated cyber security team<\/h3>\n\n\n\n<p>Internal or obtained via <a href=\"https:\/\/codeandpepper.com\/services\/#services-team-augmentation\" target=\"_blank\" rel=\"noreferrer noopener\">team augmentation<\/a>, cyber security experts are necessary on every step of the Software\/System Development Life Cycle (SDLC) in order to create an app that is free of vulnerabilities from the very beginning. Later on, when the product is already on the market, your security team is still vital to work on updates and monitor the hacking world for potential threats.<\/p>\n\n\n\n<p>Pro tip: a lot of work in this area can be automated with a <strong>security information and event management system<\/strong> (SIEM), which monitors data in real time to prevent any suspicious activity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-iso-27001\">2. ISO 27001<\/h3>\n\n\n\n<p>In order to be regarded as a trustworthy partner, you need to be 100% certain that your product meets all<strong> <\/strong>FinTech data security standards. The best way to do it, is to get the <strong>ISO 27001 certification<\/strong>, which focuses on ISMS (information security management system). There are quite a few steps to meet this standard but they all boil down to conducting proper risk assessment, identifying and fixing flaws, implementing security controls and keeping them reviewed regularly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-penetration-testing\">3. Penetration testing<\/h3>\n\n\n\n<p>Penetration testing is basically a simulation of a hacker\u2019s attack performed by a skilled specialist (an <em>ethical hacker<\/em>, also called a <em>white hat<\/em>). What\u2019s important, such experts have access to a full array of weaponry that real criminals use to breach security, so they can identify the flaws in the system before the actual villains use them to harm your business and your customers. However, pentesters (short for penetration testers) are usually external experts only hired for one job and have no deep insight into the systems they work with. They simply cannot replace an internal cyber security team.<\/p>\n\n\n\n<p>Thanks to regular reports from ethical hackers, you can <strong>keep your FinTech data security first-class<\/strong> at all times, maintain the ISO 20071 certification and boost your brand\u2019s credibility.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-cautious-employees\">4. Cautious employees<\/h3>\n\n\n\n<p>It may seem odd, but many hacking attacks happen without actually breaching any technological barriers. Remember how celebrities promised free Bitcoins on Twitter in July? In fact, Twitter\u2019s cyber security wasn&#8217;t breached due to infrastructure vulnerabilities. On the contrary, the attack was possible, because some employees hadn&#8217;t followed the procedures carefully enough. Or maybe the problem was the procedures themselves? However we describe it,<b> hackers managed to access the firm&#8217;s internal systems and tools by manipulating the staff with high-level access<\/b>.<\/p>\n\n\n\n<p>The company called the incident a \u201c<a href=\"https:\/\/nypost.com\/2020\/07\/16\/twitter-blames-coordinated-social-engineering-attack-for-hack\/\">coordinated social engineering attack<\/a>\u201d. Most probably, it could have been avoided if the organization had hired an ethical social engineering hacker to verify its internal procedures and had&nbsp;raised staff awareness on a regular basis with the help of <a href=\"https:\/\/www.udemy.com\/courses\/it-and-software\/network-and-security\/\">network and security training<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-swift-reaction\">5. Swift reaction<\/h3>\n\n\n\n<p>When it comes to the worst and your company falls victim to a hacker\u2019s attack, you\u2019ll need to keep a stiff upper lip. There are three <b>basic rules every organization needs to follow in order to react properly after discovering a security breach<\/b>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Inform your customers and business partners about the situation. Spare no details and make sure to state exactly what data was compromised. Also, advise your users to <strong>block their credit cards and change their passwords<\/strong> as soon as possible.<\/li><li>Always cooperate closely with the local information commissioner. In the UK it\u2019s the <a href=\"https:\/\/ico.org.uk\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Information Commissioner\u2019s Office<\/a> and each EU country has its own equivalent body (they\u2019re all listed by the <a href=\"https:\/\/edpb.europa.eu\/about-edpb\/board\/members_en\">European Data Protection Board<\/a>.)<\/li><li>Conduct a security audit to understand the attack\u2019s background and make sure you implement better security measures to avoid a similar situation in the future.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-happens-if-fintech-security-is-breached-finastra-attack-case-study\">What happens if FinTech security is breached? Finastra attack case study<\/h2>\n\n\n\n<p>In FinTech apps development, security and regulatory compliance are essential and any mistake can lead to a disaster. Even the largest financial services providers can get punished by the FCA or fall prey to hackers, just like <a rel=\"nofollow\" href=\"https:\/\/www.cshub.com\/attacks\/articles\/incident-of-the-week-finastras-ransomware-attack\">Finastra did in March<\/a>. What\u2019s the most unsettling in this case, is the fact that Finastra works with dozens of leading banks and the company&#8217;s problems can affect millions of customers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-one-update-too-late\">One update too late<\/h3>\n\n\n\n<p>Seemingly minor human errors are one of the most common causes of attacks. In the case of Finastra, somebody <b>forgot to check whether the VPN (Pulse Secure VPN) had been patched to the latest version.<\/b> Hackers made use of a vulnerability discovered back in 2019 (known as <a rel=\"nofollow\" href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-11510\">CVE-2019-11510<\/a>) to trigger a further chain of events and, eventually, breach the security system and write arbitrary files to the host.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-aftermath\">Aftermath<\/h3>\n\n\n\n<p>As a result, the FinTech giant, which employs over 10,000 people and reported $2 billion in revenues for 2019, had to disconnect all its systems from the Internet to perform a thorough investigation. Moreover, vital data about top banks from over 40 countries might have been stolen. And all Finastra had to do was stick to the basic FinTech security solutions&#8230;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-cheer-up\">Cheer up!<\/h3>\n\n\n\n<p>Is creating a FinTech app that can operate in a legal and secure way &#8211; while still being user-friendly &#8211; a challenge? Sure it is, but there\u2019s no need to feel overwhelmed. <b>Success might be a matter of <a href=\"https:\/\/codeandpepper.com\/2020\/01\/31\/reliability-choosing-technology-partner\/\">choosing the right technology partner<\/a>, <\/b>who will make sure your app meets the key <strong>FinTech security standards<\/strong> and works like a charm at all times. <\/p>\n\n\n\n\n\n<section id=\"contact\" class=\"contact-block block common-block \">\n  <div class=\"container\">\n\n\n    \n  <svg class=\"wave\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"280\" height=\"9\" viewBox=\"0 0 280 9\">\n    <path fill=\"currentColor\" fill-rule=\"evenodd\" d=\"M0 3.6c2.88 0 4.18-.668 5.824-1.515C7.724 1.108 9.879 0 13.998 0c4.12 0 6.274 1.108 8.175 2.085 1.644.847 2.943 1.515 5.823 1.515 2.88 0 4.179-.668 5.824-1.515C35.72 1.108 37.874 0 41.995 0c4.12 0 6.274 1.108 8.174 2.085 1.645.847 2.945 1.515 5.824 1.515 2.88 0 4.18-.668 5.826-1.515C63.719 1.108 65.873 0 69.993 0c4.12 0 6.274 1.108 8.174 2.085 1.645.847 2.945 1.515 5.823 1.515 2.88 0 4.18-.668 5.825-1.515C91.715 1.108 93.87 0 97.99 0c4.12 0 6.273 1.108 8.174 2.085 1.645.847 2.945 1.515 5.823 1.515 2.88 0 4.178-.668 5.824-1.515 1.9-.977 4.054-2.085 8.173-2.085 4.12 0 6.273 1.108 8.174 2.085 1.646.847 2.945 1.515 5.825 1.515 2.88 0 4.18-.668 5.826-1.515 1.9-.977 4.055-2.085 8.175-2.085 4.12 0 6.273 1.108 8.174 2.085 1.646.847 2.945 1.515 5.825 1.515 2.88 0 4.179-.668 5.824-1.515 1.9-.977 4.054-2.085 8.175-2.085 4.12 0 6.274 1.108 8.175 2.085 1.646.847 2.946 1.515 5.826 1.515 2.88 0 4.18-.668 5.826-1.515 1.9-.977 4.054-2.085 8.175-2.085 4.12 0 6.273 1.108 8.174 2.085 1.646.847 2.945 1.515 5.825 1.515 2.881 0 4.18-.668 5.827-1.515 1.9-.977 4.056-2.085 8.176-2.085 4.121 0 6.276 1.108 8.177 2.085 1.646.847 2.946 1.515 5.827 1.515s4.181-.668 5.828-1.515C259.718 1.108 261.873 0 265.995 0c4.121 0 6.275 1.108 8.177 2.084 1.645.848 2.946 1.516 5.828 1.516V9h-.007l-5.252-.793c-1.129-.382-2.056-.848-2.919-1.291-1.646-.847-2.946-1.516-5.827-1.516-2.882 0-4.183.669-5.829 1.516-1.9.977-4.056 2.084-8.177 2.084-4.12 0-6.275-1.107-8.176-2.084-1.647-.847-2.947-1.516-5.828-1.516-2.88 0-4.18.669-5.827 1.516-1.9.977-4.055 2.084-8.176 2.084-4.12 0-6.273-1.107-8.175-2.084-1.645-.847-2.944-1.516-5.824-1.516s-4.18.669-5.826 1.516c-1.9.977-4.055 2.084-8.175 2.084-4.12 0-6.275-1.107-8.176-2.084-1.644-.847-2.945-1.516-5.825-1.516-2.88 0-4.18.669-5.825 1.516-1.9.977-4.054 2.084-8.174 2.084-4.12 0-6.274-1.107-8.176-2.084-1.644-.847-2.943-1.516-5.823-1.516-2.88 0-4.18.669-5.826 1.516-1.9.977-4.054 2.084-8.175 2.084-4.12 0-6.274-1.107-8.174-2.084-1.646-.847-2.946-1.516-5.825-1.516s-4.179.669-5.824 1.516c-1.9.977-4.053 2.084-8.173 2.084s-6.273-1.107-8.173-2.084c-1.645-.847-2.945-1.516-5.824-1.516-2.88 0-4.179.669-5.824 1.516C90.265 7.893 88.11 9 83.99 9c-4.12 0-6.273-1.107-8.173-2.084-1.645-.847-2.944-1.516-5.824-1.516s-4.18.669-5.825 1.516C62.268 7.893 60.113 9 55.993 9c-4.12 0-6.274-1.107-8.174-2.084-1.645-.847-2.945-1.516-5.824-1.516-2.88 0-4.18.669-5.825 1.516C34.27 7.893 32.116 9 27.996 9c-4.12 0-6.273-1.107-8.174-2.084-1.645-.847-2.945-1.516-5.824-1.516s-4.179.669-5.824 1.516C7.311 7.359 1.127 8.618 0 9\"\/>\n<\/svg>\n\n<p class=\"block-title section-title\">\n  We have Senior React &#038; Node engineers <br class=\"desktop-only\">available at the moment.<\/p>\n\n\n  <div class=\"block-description typography-body\">\n    <p>Want to have them working for you? <br class=\"desktop-only\"> Leave your contact details and I\u2019ll get to you back right away.<\/p>\n  <\/div>\n\n    \n          <div class=\"contact-block-person\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"90\" height=\"90\" src=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/Olga_Pogorzelska_online-6-90x90.png\" class=\"contact-block-person-image\" alt=\"\" srcset=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/Olga_Pogorzelska_online-6-90x90.png 90w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/Olga_Pogorzelska_online-6-150x150.png 150w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/Olga_Pogorzelska_online-6-140x140.png 140w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/Olga_Pogorzelska_online-6-160x160.png 160w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/Olga_Pogorzelska_online-6-136x136.png 136w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/Olga_Pogorzelska_online-6.png 200w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/>        <div class=\"contact-block-person-text\">\n          <div class=\"typography-title-m\">\n            Olga Pogorzelska          <\/div>\n          <div class=\"typography-body-medium\">\n            New Business          <\/div>\n        <\/div>\n      <\/div>\n    \n\n    <form class=\"contact-form\" method=\"POST\" action=\"https:\/\/codeandpepper.com\/wp-admin\/admin-ajax.php\">\n            <amp-recaptcha-input layout=\"nodisplay\" name=\"recaptcha_token\" data-sitekey=\"6LeEo8cqAAAAABpahzrYQeEsO-xoutAjoIkrKpTB\" data-action=\"contact_block\"><\/amp-recaptcha-input>\n            <input type=\"hidden\" name=\"action\" value=\"contact_block_submit\" \/>\n      <input type=\"hidden\" name=\"block\" value=\"smallContactForm\" \/>\n      <input id=\"contact-email\" type=\"email\" name=\"email\" placeholder=\"Email\" class=\"gtm_form_input\" required>\n      <label for=\"contact-email\" class=\"contact-block-hidden-label\">Email<\/label>\n      <input id=\"contact-name\" type=\"text\" name=\"name\" placeholder=\"Full name\" class=\"gtm_form_input\" required>\n      <label for=\"contact-name\" class=\"contact-block-hidden-label\">\n        Full name      <\/label>\n\n      <input type=\"submit\" name=\"submit\" value=\"contact me\" class=\"gtm_form_submit btn-big\">\n\n      <div submitting>\n      <\/div>\n      <div id=\"TYPSmallForm\" class=\"submit-msg submit-success\" submit-success>\n        <template type=\"amp-mustache\">\n          <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26\" height=\"26\" viewBox=\"0 0 26 26\">\n    <g fill=\"none\" fill-rule=\"evenodd\">\n        <g stroke=\"#FFF\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" transform=\"translate(1 1)\">\n            <path d=\"M17 8.5l-7.5 7L7 13\"\/>\n            <circle cx=\"12\" cy=\"12\" r=\"11.5\"\/>\n        <\/g>\n        <path d=\"M1 1h24v24H1z\"\/>\n    <\/g>\n<\/svg>\n          Your message has been sent. We will get back to you as soon as possible.\n        <\/template>\n      <\/div>\n      <div id=\"ErrorSmallForm\" class=\"submit-msg submit-error\" submit-error>\n        <template type=\"amp-mustache\">\n          <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"25\" height=\"25\" viewBox=\"0 0 25 25\">\n    <g fill=\"none\" fill-rule=\"evenodd\">\n        <g stroke=\"currentColor\" stroke-linejoin=\"round\">\n            <path stroke-linecap=\"round\" stroke-width=\"2\" d=\"M23.498 12.31c.105 6.075-4.923 11.086-10.998 11.192-6.074.104-10.893-4.734-10.998-10.81C1.396 6.619 6.426 1.606 12.5 1.502c6.074-.106 10.893 4.734 10.998 10.808zM12.5 14V7\"\/>\n            <path fill=\"currentColor\" stroke-width=\"1.5\" d=\"M13 17.5a.5.5 0 0 1-1 0 .5.5 0 0 1 1 0z\"\/>\n        <\/g>\n        <path d=\"M1 0h24v24H1z\"\/>\n    <\/g>\n<\/svg>\n          Oops! Something went wrong. Please try again later.\n        <\/template>\n      <\/div>\n    <\/form>\n\n\n  <\/div>\n<\/section>\n<style type=\"text\/css\">\n  #contact {\n    background: #009fe3;\n    color: #FFFFFF;\n  }\n\n  #contactsvg {\n    color: #ffffff;\n  }\n<\/style>","protected":false},"excerpt":{"rendered":"<p>In the UK, FinTech apps should be handled in a way similar to banking institutions, both from the legal and technological point of view. It obviously imposes a lot of responsibility and work to ensure the system is 100% secure, so users can trust it with their money. But what does it mean in practice?<a class=\"moretag\" href=\"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/\"> Read the full article&#8230;<\/a><\/p>\n","protected":false},"author":20414,"featured_media":11071,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1651],"tags":[1603,1127,570],"class_list":["post-11063","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-qa","tag-business-management","tag-fintech-cyber-security","tag-transparency-it"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>FinTech Security Standards and Requirements | Code &amp; Pepper<\/title>\n<meta name=\"description\" content=\"Launching a secure FinTech app requires compliance with many standards and regulations. Find out what to do to meet them all!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FinTech Security Standards and Requirements | Code &amp; Pepper\" \/>\n<meta property=\"og:description\" content=\"Launching a secure FinTech app requires compliance with many standards and regulations. Find out what to do to meet them all!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/\" \/>\n<meta property=\"og:site_name\" content=\"Code &amp; Pepper\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/codeandpepper\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-02T11:59:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-21T09:51:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/08\/Fintech-apps-security-essentials.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"625\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jakub Skowron\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@codeandpepper\" \/>\n<meta name=\"twitter:site\" content=\"@codeandpepper\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jakub Skowron\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/\"},\"author\":{\"name\":\"Jakub Skowron\",\"@id\":\"https:\/\/codeandpepper.com\/#\/schema\/person\/68ec3d97f32cc58205eb549846edefc2\"},\"headline\":\"Essential Security Standards and Requirements for FinTech Apps\",\"datePublished\":\"2020-09-02T11:59:45+00:00\",\"dateModified\":\"2023-12-21T09:51:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/\"},\"wordCount\":1276,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/codeandpepper.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/08\/Fintech-apps-security-essentials.png\",\"keywords\":[\"Business management\",\"FinTech cyber security\",\"Transparency IT\"],\"articleSection\":[\"Quality Assurance\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/\",\"url\":\"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/\",\"name\":\"FinTech Security Standards and Requirements | Code &amp; Pepper\",\"isPartOf\":{\"@id\":\"https:\/\/codeandpepper.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/08\/Fintech-apps-security-essentials.png\",\"datePublished\":\"2020-09-02T11:59:45+00:00\",\"dateModified\":\"2023-12-21T09:51:54+00:00\",\"description\":\"Launching a secure FinTech app requires compliance with many standards and regulations. Find out what to do to meet them all!\",\"breadcrumb\":{\"@id\":\"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/#primaryimage\",\"url\":\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/08\/Fintech-apps-security-essentials.png\",\"contentUrl\":\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/08\/Fintech-apps-security-essentials.png\",\"width\":1200,\"height\":625,\"caption\":\"Essential Security Standards and Requirements for FinTech Apps\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/codeandpepper.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Essential Security Standards and Requirements for FinTech Apps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/codeandpepper.com\/#website\",\"url\":\"https:\/\/codeandpepper.com\/\",\"name\":\"Code & Pepper\",\"description\":\"FinTech Developers\",\"publisher\":{\"@id\":\"https:\/\/codeandpepper.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/codeandpepper.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/codeandpepper.com\/#organization\",\"name\":\"Code & Pepper\",\"url\":\"https:\/\/codeandpepper.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/codeandpepper.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/06\/logo.png\",\"contentUrl\":\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/06\/logo.png\",\"width\":319,\"height\":144,\"caption\":\"Code & Pepper\"},\"image\":{\"@id\":\"https:\/\/codeandpepper.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/codeandpepper\/\",\"https:\/\/x.com\/codeandpepper\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/codeandpepper.com\/#\/schema\/person\/68ec3d97f32cc58205eb549846edefc2\",\"name\":\"Jakub Skowron\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/codeandpepper.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/80c7b9bee020a5c6d10ada022cff86922d3df0f41c215be1015dd9f9d8dfa049?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/80c7b9bee020a5c6d10ada022cff86922d3df0f41c215be1015dd9f9d8dfa049?s=96&d=mm&r=g\",\"caption\":\"Jakub Skowron\"},\"description\":\"Technology enthusiast, literature devourer, and creator of insightful FinTech-related content. In his spare time, he also works with international public art projects.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/jakub-skowron-7b2424a1\/\"],\"url\":\"https:\/\/codeandpepper.com\/author\/jakub-skowron\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"FinTech Security Standards and Requirements | Code &amp; Pepper","description":"Launching a secure FinTech app requires compliance with many standards and regulations. Find out what to do to meet them all!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/","og_locale":"en_US","og_type":"article","og_title":"FinTech Security Standards and Requirements | Code &amp; Pepper","og_description":"Launching a secure FinTech app requires compliance with many standards and regulations. Find out what to do to meet them all!","og_url":"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/","og_site_name":"Code &amp; Pepper","article_publisher":"https:\/\/www.facebook.com\/codeandpepper\/","article_published_time":"2020-09-02T11:59:45+00:00","article_modified_time":"2023-12-21T09:51:54+00:00","og_image":[{"width":1200,"height":625,"url":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/08\/Fintech-apps-security-essentials.png","type":"image\/png"}],"author":"Jakub Skowron","twitter_card":"summary_large_image","twitter_creator":"@codeandpepper","twitter_site":"@codeandpepper","twitter_misc":{"Written by":"Jakub Skowron","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/#article","isPartOf":{"@id":"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/"},"author":{"name":"Jakub Skowron","@id":"https:\/\/codeandpepper.com\/#\/schema\/person\/68ec3d97f32cc58205eb549846edefc2"},"headline":"Essential Security Standards and Requirements for FinTech Apps","datePublished":"2020-09-02T11:59:45+00:00","dateModified":"2023-12-21T09:51:54+00:00","mainEntityOfPage":{"@id":"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/"},"wordCount":1276,"commentCount":0,"publisher":{"@id":"https:\/\/codeandpepper.com\/#organization"},"image":{"@id":"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/#primaryimage"},"thumbnailUrl":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/08\/Fintech-apps-security-essentials.png","keywords":["Business management","FinTech cyber security","Transparency IT"],"articleSection":["Quality Assurance"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/","url":"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/","name":"FinTech Security Standards and Requirements | Code &amp; Pepper","isPartOf":{"@id":"https:\/\/codeandpepper.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/#primaryimage"},"image":{"@id":"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/#primaryimage"},"thumbnailUrl":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/08\/Fintech-apps-security-essentials.png","datePublished":"2020-09-02T11:59:45+00:00","dateModified":"2023-12-21T09:51:54+00:00","description":"Launching a secure FinTech app requires compliance with many standards and regulations. Find out what to do to meet them all!","breadcrumb":{"@id":"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/#primaryimage","url":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/08\/Fintech-apps-security-essentials.png","contentUrl":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/08\/Fintech-apps-security-essentials.png","width":1200,"height":625,"caption":"Essential Security Standards and Requirements for FinTech Apps"},{"@type":"BreadcrumbList","@id":"https:\/\/codeandpepper.com\/fintech-security-standards-and-requirements\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/codeandpepper.com\/"},{"@type":"ListItem","position":2,"name":"Essential Security Standards and Requirements for FinTech Apps"}]},{"@type":"WebSite","@id":"https:\/\/codeandpepper.com\/#website","url":"https:\/\/codeandpepper.com\/","name":"Code & Pepper","description":"FinTech Developers","publisher":{"@id":"https:\/\/codeandpepper.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/codeandpepper.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/codeandpepper.com\/#organization","name":"Code & Pepper","url":"https:\/\/codeandpepper.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/codeandpepper.com\/#\/schema\/logo\/image\/","url":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/06\/logo.png","contentUrl":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/06\/logo.png","width":319,"height":144,"caption":"Code & Pepper"},"image":{"@id":"https:\/\/codeandpepper.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/codeandpepper\/","https:\/\/x.com\/codeandpepper"]},{"@type":"Person","@id":"https:\/\/codeandpepper.com\/#\/schema\/person\/68ec3d97f32cc58205eb549846edefc2","name":"Jakub Skowron","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/codeandpepper.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/80c7b9bee020a5c6d10ada022cff86922d3df0f41c215be1015dd9f9d8dfa049?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/80c7b9bee020a5c6d10ada022cff86922d3df0f41c215be1015dd9f9d8dfa049?s=96&d=mm&r=g","caption":"Jakub Skowron"},"description":"Technology enthusiast, literature devourer, and creator of insightful FinTech-related content. In his spare time, he also works with international public art projects.","sameAs":["https:\/\/www.linkedin.com\/in\/jakub-skowron-7b2424a1\/"],"url":"https:\/\/codeandpepper.com\/author\/jakub-skowron\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/posts\/11063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/users\/20414"}],"replies":[{"embeddable":true,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/comments?post=11063"}],"version-history":[{"count":83,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/posts\/11063\/revisions"}],"predecessor-version":[{"id":51260,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/posts\/11063\/revisions\/51260"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/media\/11071"}],"wp:attachment":[{"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/media?parent=11063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/categories?post=11063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/tags?post=11063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}