• Identity and Access Governance
  • RBAC
  • Role Management
  • Data Loss Prevention
  • DLP
  • FINMA
  • Compliance

Key Challenges

Swiss private banks must comply with FINMA 2008/21, specifically appendix 3, which focuses on Client Identifying Data (CID).

To meet this regulation, the client needed to implement an access control framework. This framework had to monitor data visibility and apply consistent controls across all IT systems, including the core banking system, CRM, shared drives, and ECM.

Because the bank operates internationally, another challenge was managing data visibility depending on client residency. Different rules applied depending on whether the CID was Swiss or foreign, and whether it was accessed from Switzerland or abroad.

Role Management in Banking: CBTW’s Approach

Following regulatory directives, the mission applied the “need to know” principle. This restricted access to client data strictly to those who required it for their daily tasks.

To strengthen role management in banking, CBTW supported the client through several key initiatives:

  • Conducted workshops to improve the RBAC framework based on mined roles
  • Applied a hybrid top-down and bottom-up role-mining approach
  • Performed a Segregation of Duties (SoD) analysis to enhance information risk management and support data loss prevention in banking

Banking Data Governance and Regulatory Benefits

Today, the customer applies a rule-based RBAC framework to improve operational security. This enabled the migration of certain applications into the new access control model. As a result, access to Client Identifying Data is now restricted to Switzerland.

This mission also helped validate compliance with FINMA 2008/21 appendix 3. In doing so, it reinforced the bank’s banking data governance and fulfilled a key regulatory requirement.

Technologies & Partners

Technologies and Partners' logos CBTW collaborated with for the "Identity Access Management for a Swiss Private Bank" project
Share
Insights

Access related expert insights

Expert Articles
Expert Articles
21 May 2026
For the past decade, fintechs scaled fast by renting capability - cloud infrastructure, engineering talent, and core systems. It worked. Until it didn’t. The regulatory environment of 2026 has fundamentally closed that window. With the Digital Operational Resilience Act (DORA) now in full force and the EU AI Act raising the bar on AI transparency, the "our vendor handles that" defense is no longer viable. Regulators don't accept it. Auditors don't accept it. And increasingly, your board shouldn't either.
Build-Operate-Transfer Model: Why Fintech’s Future Depends on Owning Your Tech
Build-Operate-Transfer Model: Why Fintech’s Future Depends on Owning Your Tech
Expert Articles
Expert Articles
21 May 2026
yberattacks often begin long before a suspicious login, ransomware note, or phishing email reaches the organization. The starting point may already be outside the company’s control: an employee email, password, session token, or device record circulating through breach dumps, criminal forums, Telegram channels, or infostealer logs...
Dark Web Monitoring: Are Your Employees’ Credentials Already Exposed?
Dark Web Monitoring: Are Your Employees’ Credentials Already Exposed?
Expert Articles
Expert Articles
18 May 2026
Most engineering leaders searching for offshore delivery options start with the same term: offshore development center. It is the right instinct. But the organizations that scale fastest, protect their IP most effectively, and reduce vendor dependency over time tend to take the model further. Understanding what is an offshore development center is the starting point. Understanding why the […]
What is an Offshore Development Center?
What is an Offshore Development Center?