Start now →

Building a Secure, Internet-Isolated Fintech Platform on AWS

By TemaBit Fozzy Group · Published March 30, 2026 · 9 min read · Source: Fintech Tag
RegulationSecurity
Building a Secure, Internet-Isolated Fintech Platform on AWS

Building a Secure, Internet-Isolated Fintech Platform on AWS

TemaBit Fozzy GroupTemaBit Fozzy Group8 min read·Just now

--

Authors: Artem Hrechanychenko, Stas Kolenkin

Designing a production-grade, zero-internet-access environment with Amazon EKS and AWS managed services

Financial institutions face a structural tension: they are expected to deliver modern, cloud-native applications at speed while operating under some of the industry’s most stringent security and compliance requirements.

For many fintech and banking platforms, this tension resolves into a clear mandate: production workloads must not have direct internet access. Eliminating internet connectivity significantly reduces the attack surface and helps meet regulatory expectations — but it also raises difficult questions.

This article outlines how we designed and deployed a fully internet-isolated, production-grade fintech platform on AWS, running multiple microservices on Amazon EKS. The result is an environment that meets regulatory and security requirements without compromising operational efficiency or developer velocity.

The Challenge: Security Without Slowing Delivery

Our client operates mission-critical banking applications and requires a platform with strict constraints:

At the same time, the platform needed to support external customer-facing services and integrate with internal banking systems, while maintaining tight perimeter controls. Meeting these requirements demanded more than tightening security controls — it required re-thinking network, access, and operational design from first principles.

Architecture Overview: A Private, Controlled Core

We designed the platform around a private, internet-isolated core. All ingress and egress traffic flows through explicit, controlled entry and exit points, with no implicit connectivity.

Press enter or click to view image in full size

At a high level:

There are no NAT Gateways, no Internet Gateways, and no public EKS endpoints. This design ensures every network path is intentional, observable, and auditable.

Enforcing Isolation at the Pod Network Layer

In regulated environments, isolation cannot rely solely on policy. It must be enforced at the infrastructure level.

One of our most critical requirements was to ensure that pod IP addresses could never be routed into corporate or banking networks — even accidentally.

Using Non-Routable CGNAT Space

We configured the VPC CNI plugin to assign pod IP addresses from a non-routable CGNAT range:

Pod CIDR: 10.0.0.0/16

This range is intentionally not allocated through AWS IPAM and is not routable across the Transit Gateway. As a result:

VPC CNI Custom Networking

To implement this model, we used VPC CNI custom networking with ENIConfig resources per Availability Zone and node group. Each worker node uses an ENIConfig that references dedicated subnets mapped to the 10.0.0.0/.16 range. This configuration allows us to:

ENI Prefix Delegation

For better scalability, we enabled ENI prefix delegation. Each ENI receives a /28 prefix, providing up to 16 pod IPs per prefix. The benefits:

Configuration Details

We run the VPC CNI plugin in custom network configuration mode:

AWS_VPC_K8S_CNI_CUSTOM_NETWORK_CFG=true

AWS_VPC_K8S_CNI_EXTERNALSNAT=false

Setting AWS_VPC_K8S_CNI_EXTERNALSNAT=false ensures the node performs SNAT. This enables fully deterministic egress through the firewall while preserving pod identity visibility for the Security Operations Center (SOC) and audit systems.

Routing Isolation as a Security Control

Because 10.0.0.0/16 is non-routable through Transit Gateway:

Application egress still works normally. Pod traffic is SNATed on the node, and egress leaves the VPC using the node’s primary VPC IP address. This address is routable through the Transit Gateway and inspected at the hardware firewall.

This design combines pod-level isolation with controlled egress and full auditability — a hardened network posture aligned with financial regulatory requirements.

DNS as a Security Control

DNS is often overlooked — but in isolated environments, it becomes a critical control plane.

Instead of using Amazon Route 53 Resolver for inbound and outbound queries, we deployed EC2-based DNS resolvers with static IPs. These resolvers:

This model gives us complete control over DNS behavior, change management, and inspection, while maintaining the benefits of AWS private networking.

Access Model: Zero Direct Human Access

Press enter or click to view image in full size

To maintain auditability and reduce risk, we adopted a zero-direct-access model for both production and test environments.

This model simplifies compliance, improves traceability, and removes an entire class of operational risk — while still enabling rapid iteration through automated pipelines.

Security Built Into the Platform

Security controls are layered and automated throughout the environment:

The platform successfully passed the AWS Foundational Technical Review (FTR) and a dedicated Amazon EKS security audit, validating the architecture against AWS best practices.

Automation and CI/CD in a Private World

Press enter or click to view image in full size

Internet isolation does not eliminate CI/CD — it changes how it’s designed.

All pipelines run on private infrastructure and interact exclusively through VPC endpoints and internal services. Key elements include:

The result is a delivery pipeline that is fully automated, fully auditable, and entirely private.

FinOps: Making Private Infrastructure Cost-Effective

A common misconception is that private environments are inherently expensive. In practice, cost discipline must be intentional.

We applied FinOps principles from the start:

Security and cost efficiency are not opposites — when designed together, they reinforce each other.

Lessons Learned

Several important themes emerged during the design and operation of this platform, each reinforcing the criticality of early architectural decisions in regulated environments.

Technologies such as Karpenter, AWS Graviton, and managed AWS services played a key role in balancing security, performance, and cost.

Recommendations for Regulated AWS Environments

Teams designing regulated platforms on AWS can reduce risk and complexity by adopting a few foundational practices early in their journey.

Start by designing network and access models before building applications. Decisions around routing, ingress, egress, DNS, and identity have far-reaching implications and are much harder to change once workloads are in production. A clear upfront design creates a stable foundation for both security and scalability.

Treat DNS, routing, and identity as first-class security controls, not just supporting services. In tightly controlled environments, these layers define trust boundaries and determine what can communicate with what. Investing in their design pays dividends in auditability and operational clarity.

Adopting GitOps as the primary operational model significantly reduces human risk while improving traceability. When all changes flow through version-controlled pipelines, audits become simpler, rollbacks become safer, and environments remain consistent.

Automation should be embedded from day one. Compliance checks, security audits, and tagging enforcement are far more effective when they run continuously rather than as periodic manual reviews. Automation helps teams maintain compliance as the platform evolves.

Finally, use AWS managed services wherever possible. Managed services reduce operational overhead, improve reliability, and enable teams to focus on security, compliance, and application delivery rather than on infrastructure maintenance.

Conclusion

Building a fintech platform on AWS requires balancing security, compliance, and developer velocity. By eliminating direct internet access, using AWS managed services, and automating security and cost controls, we created a resilient, auditable, and cost-efficient environment for highly regulated workloads.

If you’re working in a similar space, start with network and access design. Integrate security controls into your development process, not as an afterthought. Use services like VPC endpoints, AWS Shield, Amazon GuardDuty, AWS Config, and Karpenter to simplify operations. Adopt GitOps and automate everything you can.

This approach proves that tight security controls and fast development cycles aren’t mutually exclusive — they just need the right architecture.

This article was originally published on Fintech Tag and is republished here under RSS syndication for informational purposes. All rights and intellectual property remain with the original author. If you are the author and wish to have this article removed, please contact us at [email protected].

NexaPay — Accept Card Payments, Receive Crypto

No KYC · Instant Settlement · Visa, Mastercard, Apple Pay, Google Pay

Get Started →