April 25, 2025

Addressing JP Morgan's Warning: How imPAC's Asset Chain Technology Secures Modern Cloud Infrastructure

Thinh Le
Principal Engineer

In response to JP Morgan's recent open letter on third-party supplier security concerns, we examine how innovative cloud security approaches can address today's most pressing risks.

JP Morgan's CISO Patrick Opet recently published an open letter warning that the modern SaaS delivery model is "creating a substantial vulnerability that is weakening the global economic system." The letter highlights how over-reliance on a handful of SaaS providers has embedded concentration risk into critical infrastructure, creating single points of failure with potentially catastrophic consequences.

At imPAC Labs, we've been developing solutions to precisely address these challenges. The software supply chain vulnerabilities that JP Morgan identifies aren't theoretical – they're already disrupting businesses and threatening financial systems worldwide.

Beyond Detection: Verified Security Through Asset Chain Technology

The traditional approach to cloud security – scanning for misconfigurations and reporting findings – is no longer sufficient in today's interconnected environments. As Opet notes,"security practices enforced strict segmentation between a firm's trusted internal resources and untrusted external interactions" but modern integration patterns have dismantled these boundaries.

imPAC's asset chain policy technology addresses this new reality by verifying actual security states across multiple cloud providers, including AWS, Azure, GCP, and OCI. Unlike conventional tools that merely check configurations, our approach ensures that security controls are functioning as intended.

How Asset Chain Policy Technology Works

Our platform powered by asset chain technology revolutionizes cloud security in four key ways:

1. Verification Beyond Configuration Checking

Consider an AWS S3 bucket configured for cross-provider replication to Azure or GCP for redundancy. Traditional tools would simply verify that replication is enabled in the settings. imPAC's asset chain goes deeper – confirming that objects actually exist in the destination account and region, eliminating silent failures that could compromise recovery efforts during an incident.

This verification-based approach addresses JP Morgan's concern that attackers are "targeting trusted integration partners" by ensuring that the entire chain of connected resources remains secure.

2. Continuous Real-Time Monitoring

JP Morgan emphasizes that annual compliance checks are insufficient, demanding "continuous, demonstrable evidence that controls are working effectively." imPAC's policy engine enables security teams to scan settings as frequently as needed – hourly, daily, or in response to specific events – establishing a continuous security posture that adapts to rapidly changing cloud environments.

3. Transparent Visibility with Responsible Automation

Our platform's read-only design ensures complete transparency – every configuration is visible with no hidden corners. When remediation is required, imPAC implements responsible automation through workflow-based approvals tied directly to policy evaluations, enabling secure fixes without compromising safety.

Whether adjusting encryption settings or modifying access controls, all remediation actions are seamless, auditable, and aligned with organizational policies.

4. Data-Aware Security Prioritization

By integrating with Data SecurityPosture Management (DSPM) vendors, imPAC adds sensitive data context to each asset. This enables security teams to prioritize protection efforts based on actual risk, focusing resources where they deliver the greatest business value.

Meeting JP Morgan's Call for Action

JP Morgan's letter makes a clear demand: "Providers must urgently reprioritize security, placing it equal to or above launching new products." imPAC delivers on this call to action through multiple capabilities that align with their concerns:

Systemic Risk Reduction

Cross-provider backups (e.g., AWS toOCI) mitigate concentration risks, directly addressing JP Morgan's warning about single points of failure. By verifying that disaster recovery mechanisms actually work, imPAC helps organizations build resilient supply chains that can withstand individual provider failures.

Proactive Resilience

Continuous monitoring ensures configurations remain secure and backups are always ready, transforming security from a periodic checkbox to an ongoing operational state. This approach directly supports JP Morgan's call for "sophisticated authorization methods, advanced detection capabilities, and proactive measures."

Data-Driven Security

DSPM integration highlights sensitive data locations, enabling targeted protection for an organization's most valuable assets. This intelligence-driven approach helps security teams make informed decisions about where to focus their efforts in complex, multi-cloud environments.

Transparent yet Actionable Security

The read-only platform ensures visibility across all cloud assets, while automated, workflow-driven remediation delivers fixes responsibly. This balance addresses JP Morgan's demand for "secure by default configurations, transparency to risks, and management of the controls they need to operate safely."

Effortless Compliance

No-code automation and tamper-proof audit trails simplify security operations, freeing engineers to focus on innovation rather than manual compliance tasks. This efficiency is critical as organizations struggle to hire and retain security talent in today's competitive market.

Building Resilient Cloud Infrastructure

In a world where a single misconfiguration can lead to disaster, imPAC's asset chain technology delivers proven, multi-cloud resilience. Rather than simply alerting on potential issues, it verifies security across the entire chain of cloud resources, ensuring that protection measures actually work as intended.

As JP Morgan's Opet concludes,"The most effective way to begin change is to reject these integration models without better solutions." imPAC offers exactly that – a better solution that addresses the fundamental challenges of modern cloud security.

By moving beyond configuration checking to actual security verification, organizations can build infrastructure that's secure by design and resilient enough to withstand today's rapidly evolving threat landscape.

Want to learn how imPAC can help secure your multi-cloud environment against the risks highlighted by JP Morgan? Contact our team for a demonstration of our asset chain technology inaction.

Conquer the Cyber Frontier

Every business faces the storm of cyber threats and compliance demands. With imPAC, harness the elements of security—visibility, control, and swift action—to safeguard your organization's journey across the cloud frontier.
Request a Demo