Workload classification is the foundation of designing a compliant architecture.
You cannot choose controls, resiliency levels, or architectural patterns until you know:
What the workload does
How important it is
What kind of data it handles
How regulators treat it
Think of classification as labeling the workload correctly, so you know how much protection it needs.
Regulatory criticality answers the question:
“How important is this workload from a regulatory perspective?”
There are usually three categories:
Mission-critical workloads
These must never go down.
Examples:
Core banking systems
Payment gateways
ATM transaction processing
Trading systems
Real-time fraud detection
If they fail:
Customers cannot access money
Payments stop
Banks risk regulatory fines
Reputation damage is severe
Non-critical workloads
Failure has lower impact
Examples:
Internal HR tools
Marketing applications
Non-production environments
Mission-critical workloads require:
Higher availability
Stronger controls
More resilient design (e.g., multi-zone, multi-region)
Better monitoring
Faster recovery times
Non-critical workloads can use simpler designs.
Regulated workloads
Directly governed by financial regulations
Contain sensitive or regulated data
Require strict controls
Examples:
Payment services (PSD2, PCI DSS)
Customer account management
KYC (Know Your Customer) systems
Partially regulated workloads
Still important
Some controls apply, but not as strict
Examples:
Internal reporting systems
Some analytics systems
Non-regulated workloads
No regulatory requirements
Still need basic security, but not full financial controls
Examples:
Marketing websites
Test environments (with no customer data)
Correctly identifying these categories is crucial because:
Regulated workloads must follow the IBM Cloud Framework for Financial Services more strictly
Non-regulated workloads can use simpler cloud resources
Data is the most important asset in finance.
Classifying data properly ensures it is protected according to its sensitivity.
Typical categories:
No confidentiality requirements
Examples:
Public website content
Marketing materials
For internal employees only
Not harmful if leaked, but still needs protection
Examples:
Internal reports
Internal dashboards without customer data
Must be protected
Disclosure causes business harm
Examples:
Employee data
Financial policies
Internal strategies
This is extremely important in finance.
Examples:
PII (Personally Identifiable Information)
Names
Addresses
ID numbers
Phone numbers
Payment card data (PCI DSS)
Bank account details
Transaction history
Risk models
Trading strategies
Highly sensitive data requires:
Strong encryption (at rest and in transit)
Strict access control
Detailed audit logging
Proper key management
Secure networking boundaries
Compliance with data-protection laws
Business impact answers:
“What happens to the business if this workload fails?”
Three dimensions:
Examples:
Customer cannot transfer money
Trading desk loses opportunities
Bank faces penalties
Payment network loses revenue
Higher financial impact → stronger resiliency requirements.
Banks depend heavily on trust.
A failure that becomes public may:
Harm customer confidence
Attract regulatory attention
Damage the brand
Examples:
Online banking outage
Public data breach
If customers cannot:
Pay
Trade
Transfer money
Access accounts
Verify balances
the bank’s business stops.
These workloads need:
Faster RTO/RPO
Multi-zone or multi-region designs
Higher SLA expectations
Once a workload is classified, you can determine:
A highly regulated workload needs:
Stronger access controls
More encryption
More logging
More oversight
A non-regulated workload may only need basic security.
RTO (Recovery Time Objective)
How quickly the system must be restored after failure.
RPO (Recovery Point Objective)
How much data loss (time interval) is acceptable.
Mission-critical workloads → RTO/RPO must be very low.
Depending on the classification, you choose:
Multi-zone (high availability)
Multi-region (disaster recovery)
Active-active (zero downtime)
Active-standby (common DR pattern)
Single-zone (only for non-critical workloads)
This ensures the architecture matches:
Risk level
Regulatory demands
Business expectations
Understanding the customer's existing environment helps you design architecture that fits into what they already have, not in isolation.
Many financial institutions still rely on:
Legacy core banking systems
Mainframes (z/OS)
Monolithic applications
Big proprietary databases
These systems are usually:
Stable but hard to modernize
Highly critical
Difficult to migrate without downtime
Under strict regulatory governance
Cloud designs must consider:
Integration with legacy systems
Secure connectivity
Gradual migration strategies
Many banks already have private clouds.
Common platform: VMware.
They may have:
vSphere clusters
NSX networks
vSAN storage
Internal automation tools
This is often the “first step” before hybrid cloud.
IBM Cloud for Financial Services supports this through:
VMware regulated workloads
Satellite deployments
Direct Link connectivity
Many financial institutions use:
On-prem for core systems
IBM Cloud for regulated workloads
Other clouds (AWS/Azure/GCP) for analytics or internal apps
A typical hybrid pattern:
A multi-cloud design requires:
Unified identity
Consistent logging
Network routing between clouds
Shared compliance evidence
IBM Cloud Satellite helps unify some aspects of this.
Secure connectivity must:
Encrypt traffic
Be reliable
Handle high throughput
VPN is good for quick setup.
Direct Link is better for:
Core banking
Trading systems
High-volume payment flows
Banks must separate:
Public services
Private internal workloads
Admin networks
Sensitive systems
This prevents:
Lateral movement during attacks
Unauthorized access
Compliance violations
IBM Cloud VPC supports this with:
Subnets
ACLs
Security groups
Banks typically have existing identity systems:
Active Directory
LDAP
SAML providers
OAuth/OpenID Connect
Identity federation allows:
Single sign-on
Unified policy enforcement
Centralized identity lifecycle management
IBM Cloud IAM can integrate with corporate IdPs, ensuring:
Better user governance
Consistent authentication
Banks already have SOC tools:
SIEM (Security Information and Event Management)
SOAR (Security Orchestration, Automation, Response)
Log analytics
Cloud logs must integrate with these for:
Threat detection
Compliance monitoring
Incident response
IBM Cloud provides:
Activity Tracker
Flow Logs
Syslog integrations
Audit logs
Financial institutions face very strict data laws.
This section determines where data can live and what rules apply.
Data residency refers to:
“In which country or region must the data physically reside?”
Examples:
Some countries require banking data to remain within national borders.
Some regulators require multiple copies within the same region.
If a workload must comply with data-residency rules, the architecture must:
Choose an IBM Cloud region that satisfies the requirement
Avoid cross-region data movement
Use Satellite if data cannot leave on-prem
Ensure logs and backups also comply
Data sovereignty refers to:
“Which country’s laws apply to the data?”
This is different from residency.
Example:
Data stored in Country A
But processed by a cloud service legally governed by Country B
Banks must ensure:
Regulatory compliance
Correct legal jurisdiction
Correct vendor certifications
No violations of privacy laws
IBM provides:
Regions are designed with:
Strong physical security
High resiliency
Compliance certifications
Banks can choose regions that match:
GDPR
Local banking rules
National cloud requirements
IBM Cloud Satellite allows:
Data to remain on-prem
IBM Cloud services to run locally
Compliance with strict residency requirements
Satellite is perfect when:
Regulations prohibit cloud storage
Latency must be extremely low
A cloud-like experience is wanted without data movement
The operating model describes how the customer's organization works day-to-day.
Understanding this allows you to design cloud solutions that fit their processes, not force new ones.
Questions to ask:
How often do they deploy changes?
Do they use a formal CAB (Change Advisory Board)?
Are changes automated or manual?
Do regulations require approvals?
Workloads with strict change control may require:
Controlled CI/CD pipelines
Deployment windows
Audit trails
Banks follow strict processes:
ITIL-based incident management
Defined severity levels
Formal problem investigation
Root-cause analysis
Cloud design must support:
Strong observability
Clear ownership
Automated alerts
Fast recovery options
Topics include:
Who monitors alerts?
How quickly must incidents be detected?
What SIEM tools are used?
How do they correlate cloud logs with on-prem events?
Cloud logs must integrate seamlessly to prevent blind spots.
Banks undergo regular:
Internal audits
External audits
Regulatory reviews
Third-party risk assessments
Cloud design must enable:
Easy access to logs
Automated reports
Observability into controls
Documentation of compliance
If customers already use automation:
If they don’t:
You design simpler workflows
Or introduce automation gradually
You must know:
Where logs flow
How they are stored
How long they are retained
How evidence is collected
Who needs access
Depending on the customer’s internal processes:
Some controls belong to IBM
Some belong to partners
Some belong to the customer
Understanding their operating model helps you assign responsibilities correctly.
A landing zone provides a governed, pre-configured foundation for regulated workloads. It ensures that deployments begin within a secure and compliant environment.
Regulated workloads must be deployed into landing zones that apply predefined security baselines. These baselines cover identity, network restrictions, logging, and encryption, ensuring consistent compliance across environments.
Landing zones include ready-made configurations such as network isolation patterns, IAM structures, encryption defaults, and logging pipelines. These configurations enforce foundational security controls before workloads are deployed.
Workloads inherit the landing zone’s compliance posture, but inheritance is not complete. Customers remain fully responsible for workload-specific controls such as application access policies, data classification, and encryption key management.
Deploying regulated workloads outside the landing zone introduces compliance gaps. Such deployments lack the mandatory baselines and may violate regulatory expectations or internal governance standards.
Workload placement involves selecting the correct region, architecture, or platform to satisfy regulatory and operational needs.
Placement must respect laws governing data residency, sovereignty, and regional restrictions. Some workloads can only reside within specific jurisdictions or controlled environments.
Workloads requiring low latency or tight coupling with on-prem systems may need placement near existing infrastructure or through hybrid approaches such as Satellite.
Cost constraints, resilience objectives, and the availability of validated services all influence placement. Some services exist only in select regions, shaping placement decisions for regulated workloads.
Workloads with strict sovereignty requirements or ultra-low-latency needs may require deployment through Satellite to maintain local processing while using IBM Cloud services.
Control strength varies depending on workload classification and associated risks.
Mission-critical or highly sensitive workloads require strong IAM enforcement, strict encryption, enhanced logging, and real-time monitoring. These controls reflect the potential impact of failure or compromise.
Non-regulated or internal workloads may follow lighter control profiles, though they must still meet baseline security requirements.
Analytics workloads often require masking or pseudonymizing data. They may also require egress restrictions to prevent unauthorized data export.
Architecture tenancy decisions influence isolation, compliance, and risk posture.
Single-tenant environments provide dedicated compute and storage, supporting workloads with the highest sensitivity or regulatory expectations.
Multi-tenant environments are suitable when logical isolation is strong and validated controls maintain separation between tenants.
Tenancy decisions must match regulatory and data classification requirements. Sensitive workloads should not share the same trust boundary with low-sensitivity workloads.
Workloads of different sensitivity levels must not share the same high-risk boundaries without clear and justified isolation controls.
Accurate documentation of data movement is essential for regulated environments.
Workloads must include documentation showing how data enters, leaves, and moves through the system. This includes application flows, user entry points, and integrations.
Boundaries must identify ingress and egress points, trust zones, encryption boundaries, admin access paths, and integration points.
Controls depend on where data flows and what boundaries it crosses. Incorrect boundary definitions lead to incomplete control coverage and compliance failures.
Improper boundary definitions can leave parts of the architecture unprotected or subject to the wrong control category.
Regulated workloads require strict separation of environment tiers.
Production and non-production environments must be fully isolated to prevent accidental access or impact.
Production data must not be copied into non-production unless anonymized or masked to avoid unauthorized exposure.
Shared services must apply strict access controls to ensure they cannot bridge unintended access between environments.
Non-production environments must not store regulated or sensitive data unless explicitly permitted under reviewed controls.
Isolation protects workloads across multiple architectural layers.
Network boundaries can be enforced using VPCs, subnets, ACLs, and security groups. These mechanisms prevent unauthorized connectivity.
IAM boundaries use separated roles, accounts, namespaces, and access groups to isolate administrative and workload identities.
Resource-level isolation includes dedicated clusters, segregated storage, separately provisioned databases, or isolated OpenShift namespaces.
Isolation measures must align with workload sensitivity. Higher sensitivity demands stronger or layered isolation.
Compliance inheritance describes how workloads gain compliance posture from the platform and services.
Workloads automatically inherit controls embedded into validated services, platform policies, and landing zones.
Inheritance does not remove customer responsibility for controls applied at the application or data layer.
IAM permissions, encryption key choices, and application security decisions remain under customer implementation and must follow compliance standards.
Correctly identifying which controls are inherited and which require customer action is essential for complete compliance coverage.
IAM governs how administrators, workloads, and users interact with cloud resources.
IAM structures must enforce hard separation of access across environment tiers, preventing cross-environment interference.
Administrative access must follow least privilege. Emergency access must follow controlled, temporary break-glass procedures.
Federated identity must enforce consistent authentication requirements across on-prem and cloud environments.
Context-based restrictions must limit access based on source networks, geographies, or service contexts.
Resilience requirements follow workload classification and business impact expectations.
The most critical workloads require redundant regional architectures to ensure continuity during regional disruptions.
Applications facing external customers often require multi-zone deployment for uninterrupted service during zone outages.
Internal or non-critical workloads may use single-zone architectures to reduce cost when risk impact is minimal.
DR plans must include defined RTO and RPO, periodic testing, and documented evidence to satisfy regulatory expectations.
What is the primary goal of application modernization when migrating financial workloads to the cloud?
To transform legacy applications into scalable, cloud-native architectures.
Application modernization involves updating legacy systems so they can operate efficiently in cloud environments. Many financial applications were originally built as monolithic architectures that limit scalability and agility. Modernization strategies often involve decomposing these systems into microservices, implementing containerization, and using APIs to enable modular communication between services.
For financial institutions, modernization also improves resilience, security, and deployment speed while maintaining compliance requirements. IBM Cloud for Financial Services provides architecture patterns and tools that support these modernization efforts.
Demand Score: 74
Exam Relevance Score: 82
Which migration strategy involves moving an application to the cloud with minimal or no changes to its architecture?
Rehosting (lift-and-shift).
Rehosting, often called lift-and-shift migration, moves an application from on-premises infrastructure to cloud infrastructure without significant modifications to the application architecture. This approach allows organizations to quickly migrate workloads while minimizing development effort.
However, while rehosting accelerates migration timelines, it may not fully leverage cloud-native capabilities such as auto-scaling or microservices architecture. For financial institutions, lift-and-shift is often used as an initial migration phase before further modernization activities.
Demand Score: 71
Exam Relevance Score: 80
Why are microservices architectures commonly recommended for modern financial applications?
Because they enable independent scaling, faster updates, and improved system resilience.
Microservices architecture divides applications into smaller independent services that communicate through APIs. Each service can be deployed, updated, and scaled independently without affecting the rest of the system.
For financial institutions, this architecture increases agility and reduces the risk of system-wide failures. If one service fails, it does not necessarily impact other components of the application. Microservices also enable faster feature releases, which is critical for digital banking innovation.
Demand Score: 73
Exam Relevance Score: 83
What is one advantage of using IBM tools when supporting customer workload environments?
They provide integrated security, compliance monitoring, and automation capabilities.
IBM Cloud provides integrated tools that support application deployment, monitoring, and compliance management. These tools enable organizations to maintain visibility into system health, automate operational processes, and ensure workloads comply with regulatory requirements.
For financial institutions, these integrated capabilities simplify management of complex workloads and help maintain continuous compliance across the environment. Automation also reduces operational risk by minimizing manual configuration errors.
Demand Score: 70
Exam Relevance Score: 81