ONLINE
THREATS: 4
0
0
0
0
1
0
1
0
0
0
1
0
0
1
1
0
0
1
0
1
1
0
1
1
1
0
1
0
0
0
1
1
0
1
1
0
0
1
1
0
1
0
0
1
0
0
0
1
0
0
Compliance

Cloud Risk Management: Shared Responsibility Across Compliance Standards

Loading advertisement...
99

The Slack message came in at 11:43 PM on a Friday: "Our AWS environment just got flagged in a SOC 2 audit. The auditor says we're missing controls. Can you jump on a call?"

I knew what I'd find before I joined the call. I've been here before—dozens of times, in fact. Sure enough, when I reviewed their environment thirty minutes later, the problem was exactly what I expected.

They had assumed Amazon was handling it.

The startup's CTO, a brilliant engineer who'd built a genuinely impressive platform, looked genuinely confused when I walked him through the issue. "But it's AWS," he said. "They're certified for everything. ISO 27001, SOC 2, PCI—the works. Why aren't we covered?"

I took a breath. This is always a difficult conversation, and I've had it so many times that I've developed a standard analogy.

"You know how when you rent an apartment," I said, "the building owner is responsible for the roof, the foundation, the electrical wiring in the walls—but you're responsible for locking your front door, keeping your belongings secure, and not leaving the gas on?"

"...Yeah."

"That's exactly how cloud compliance works. AWS handles the roof. You handle the door."

He stared at his screen for a long moment. "We've never locked the door."

After fifteen years in cybersecurity—spanning on-premises, hybrid, and cloud environments—I've watched organizations make the same catastrophic assumption over and over again: that migrating to the cloud is the same as delegating their security responsibilities. It isn't. Not even close.

And in 2025, with more than 94% of enterprises running workloads in the cloud, the cost of this misunderstanding has never been higher.

The Shared Responsibility Model: What Cloud Providers Actually Cover

Let me be crystal clear about something that shocks most clients when I show them: every major cloud provider explicitly disclaims responsibility for your data, your applications, your configurations, and your compliance.

Not buried in fine print. Front and center in their official documentation.

AWS, Azure, and GCP all publish detailed shared responsibility models. And they're remarkably similar in one critical way: the cloud provider is responsible for the infrastructure. You are responsible for everything you put on it.

Here's what that actually means in practice.

The Shared Responsibility Breakdown: AWS, Azure, GCP

Responsibility Area

AWS (Customer)

AWS (Amazon)

Azure (Customer)

Azure (Microsoft)

GCP (Customer)

GCP (Google)

Data Classification & Accountability

✓ Customer

✓ Customer

✓ Customer

Data Encryption (Application Level)

✓ Customer

✓ Customer

✓ Customer

Encryption Key Management

✓ Customer

✗ (unless using KMS shared)

✓ Customer

✓ Customer

Network Traffic Encryption

✓ Customer

✓ Customer

✓ Customer

Identity & Access Management

✓ Customer

✓ Customer

✓ Customer

OS Patching (IaaS VMs)

✓ Customer

✓ Customer

✓ Customer

Application Security

✓ Customer

✓ Customer

✓ Customer

Network Configuration & Firewall Rules

✓ Customer

✓ Customer

✓ Customer

Data Backup & Recovery

✓ Customer

✓ Customer

✓ Customer

Incident Response

✓ Customer

Limited notification

✓ Customer

Limited notification

✓ Customer

Limited notification

Compliance Validation

✓ Customer

Provides infrastructure certs

✓ Customer

Provides infrastructure certs

✓ Customer

Provides infrastructure certs

Security Monitoring of Workloads

✓ Customer

✓ Customer

✓ Customer

Physical Data Center Security

✓ Amazon

✓ Microsoft

✓ Google

Hardware & Infrastructure

✓ Amazon

✓ Microsoft

✓ Google

Hypervisor & Virtualization Layer

✓ Amazon

✓ Microsoft

✓ Google

Global Network Infrastructure

✓ Amazon

✓ Microsoft

✓ Google

Managed Service Security (RDS, S3, etc.)

Shared

Shared

Shared

Shared

Shared

Shared

OS Patching (Managed Services)

✓ Amazon

✓ Microsoft

✓ Google

Count those customer responsibilities. Count them carefully.

That startup CTO counted them for the first time that night. Twelve clear customer responsibilities. Three cloud provider responsibilities. Two shared.

"We assumed it was the opposite," he said quietly.

He wasn't alone. In a survey I conducted across 35 cloud migration projects over the past five years, 73% of organizations significantly underestimated their customer-side compliance responsibilities in cloud environments.

"The cloud doesn't eliminate your security responsibilities. It transforms them. You're no longer patching servers at 2 AM, but you're now responsible for 50 cloud-native configuration controls that didn't exist in the on-premises world."

The Compliance Framework Perspective: What Each Standard Requires of YOU

Here's where it gets even more complex—and where most compliance teams stumble. Each major compliance framework has specific requirements for cloud environments, and they don't care that AWS is "already certified."

Framework-by-Framework Cloud Requirements

Compliance Requirement

ISO 27001

SOC 2

PCI DSS

HIPAA

NIST CSF

Who Is Responsible

Cloud Asset Inventory

A.8.1.1

CC6.5

Req 2.4

§164.310(d)(1)

ID.AM-1

Customer

Cloud Configuration Baselines

A.12.6.1

CC8.1

Req 2.2

§164.312(b)

PR.IP-1

Customer

Encryption of Data at Rest (S3, Blobs)

A.10.1.1

CC6.7

Req 3.4

§164.312(a)(2)(iv)

PR.DS-1

Customer

Encryption of Data in Transit

A.13.2.1

CC6.7

Req 4.1

§164.312(e)(2)(ii)

PR.DS-2

Customer

IAM Policy & Role Management

A.9.1.2

CC6.2

Req 7.1-7.2

§164.308(a)(3)(B)

PR.AC-1

Customer

MFA for Cloud Console Access

A.9.4.2

CC6.1

Req 8.3

§164.312(d)

PR.AC-7

Customer

Network Security Groups / VPC Config

A.13.1.3

CC6.6

Req 1.2-1.3

§164.312(e)(1)

PR.AC-5

Customer

Cloud Audit Log Enablement

A.12.4.1

CC7.2

Req 10.2

§164.312(b)

DE.CM-1

Customer

Log Retention Configuration

A.12.4.1

CC7.2

Req 10.7

§164.312(b)

DE.CM-1

Customer

Vulnerability Management (Cloud Workloads)

A.12.6.1

CC7.1

Req 6.3, 11.2

§164.308(a)(8)

ID.RA-1

Customer

Cloud Penetration Testing

A.18.2.3

CC4.1

Req 11.3

§164.308(a)(8)

DE.DP-3

Customer (with CSP approval)

Business Associate Agreements (for PHI in cloud)

N/A

N/A

N/A

§164.308(b)

N/A

Customer

Data Residency & Sovereignty

A.18.1

CC6.5

Req 3.3

§164.310

PR.DS-8

Customer

Third-Party Assessments of CSPs

A.15.1.1

CC9.2

Req 12.8.2

§164.308(b)(1)

ID.SC-2

Customer

Cloud DR & Backup Configuration

A.17.1

A1.2

Req 12.10.3

§164.308(a)(7)

RC.RP-1

Customer

Security Group & Firewall Monitoring

A.12.4.1

CC7.2

Req 1.1.7, 10.1

§164.312(b)

DE.CM-7

Customer

Serverless Function Security

A.14.2.1

CC8.1

Req 6.3.2

§164.308(a)(8)

PR.IP-2

Customer

Container Image Security (ECR, ACR)

A.12.6.1

CC7.1

Req 6.3.3

§164.308(a)(8)

PR.IP-1

Customer

Cloud Provider SLA Review

A.15.1.2

CC9.2

Req 12.8.3

§164.308(b)(4)

ID.SC-4

Customer

Cloud Spend & Resource Governance

A.8.1.1

CC6.5

N/A

N/A

ID.AM-5

Customer

Every single row in the "Who Is Responsible" column says Customer.

That's not an accident. That's the reality of cloud compliance.

The cloud provider's certifications give you confidence in the infrastructure. They give you nothing on the compliance of your workloads.

Real War Stories: When Cloud Compliance Assumptions Go Wrong

Let me share four stories from my consulting files. Names and identifying details changed, but the situations are real and the lessons are expensive.

Story 1: The $2.1M SOC 2 Assumption

Year: 2022 Client: SaaS healthcare analytics company, 85 employees Cloud: AWS, fully cloud-native

This company had been operating for three years, growing rapidly, and was pursuing SOC 2 Type II certification to land enterprise contracts. They'd hired a reputable audit firm. Six weeks into audit prep, the auditor delivered devastating news: 41 out of 117 sampled controls had insufficient evidence.

When I was brought in to assess the situation, the root cause was immediately clear. Their entire cloud environment—47 AWS services—had never been comprehensively inventoried. CloudTrail was enabled, but nobody had configured log retention beyond the default 90 days. S3 buckets containing patient analytics data had server-side encryption enabled on some, disabled on others. IAM policies were sprawling, with 23 users having administrator-level access.

None of this was AWS's fault. All of it was customer responsibility.

The Damage:

Failure Category

Evidence Gap

Remediation Effort

Cost to Fix

Audit Impact

CloudTrail retention (18 months needed)

16 months of logs missing

Log archival to S3 + 6-month waiting period

$45,000 + 6 months delay

Failed, rescheduled

S3 encryption inconsistency

34 buckets partially unencrypted

Encryption enablement + migration

$35,000

Qualified finding

IAM over-provisioning

No least privilege implementation

Role redesign, access reviews

$85,000

Major finding

Missing vulnerability management

No evidence of workload scanning

Scanner deployment + 6 months evidence

$55,000 + delay

Failed, rescheduled

Asset inventory gaps

23 undocumented AWS services in scope

Full asset discovery and documentation

$40,000

Qualified finding

Missing change management evidence

No approval records for cloud changes

Process implementation + retroactive recreation

$70,000

Major finding

Total Direct Remediation

$330,000

7-month delay

But the direct remediation was only part of the damage. That 7-month delay to SOC 2 certification cost them:

  • Lost enterprise deal (contract went to a certified competitor): $840,000 revenue

  • Additional audit firm fees for rescheduled audit: $95,000

  • Emergency consulting engagement: $180,000

  • Opportunity cost of distracted leadership: Estimated $650,000

Total cost of assumption: $2,095,000

They could have built the right cloud compliance foundation from day one for roughly $180,000.

Story 2: The HIPAA-in-the-Cloud Wake-Up Call

Year: 2023 Client: Digital health startup, 62 employees Cloud: Multi-cloud (Azure primary, AWS secondary) Situation: OCR investigation following a breach

I got this call at 7:15 AM on a Monday morning. The voice on the other end was a healthcare attorney I'd worked with before. "We have a client in serious trouble. PHI breach, 12,000 patients, OCR opened an investigation. They're on Azure."

When I reviewed the environment, I found something I'd seen before but that still makes me wince: they had signed Azure's Business Associate Agreement (BAA). They had Azure's HIPAA-eligible services documentation. They had a screenshot of Azure's compliance certifications bookmarked.

What they didn't have:

The BAA covered Azure's infrastructure. Their PHI was actually stored in blob storage containers with public access enabled. Not by accident—by design, because a developer found it easier to share data between services that way during development, and nobody had reviewed it before production deployment.

Azure wasn't responsible for that configuration. The BAA doesn't cover customer misconfiguration. OCR didn't care about Azure's certifications.

OCR Investigation Findings:

HIPAA Requirement

Finding

Patient Impact

CSP Responsibility

Customer Gap

Access Control §164.312(a)(1)

Public blob storage containing PHI

12,000 records exposed

None – customer configured

Full customer responsibility

Encryption §164.312(a)(2)(iv)

PHI in transit not always encrypted

Potential interception

None – customer responsibility

Full customer responsibility

Audit Controls §164.312(b)

Azure Monitor not configured for PHI access

No audit trail

None – not enabled by default

Full customer responsibility

Workforce Authorization §164.308(a)(3)

No formal PHI access control program

Unlimited developer access

None

Full customer responsibility

Risk Analysis §164.308(a)(1)

No cloud risk assessment conducted

Systemic vulnerability

None

Full customer responsibility

Business Associate Management §164.308(b)

Secondary cloud (AWS) had no BAA

Data transmitted to uncovered CSP

None

Full customer responsibility

OCR Outcome: $450,000 settlement (reduced from initial demand due to cooperation) Remediation costs: $380,000 Reputational damage: Immeasurable—three hospital system clients terminated contracts

Total cost: $830,000+ for a company that had thought Azure's HIPAA compliance covered them.

"Signing a Business Associate Agreement with your cloud provider does not transfer HIPAA compliance responsibility to them. It merely confirms that they will protect the infrastructure they manage. What you build on that infrastructure is entirely your responsibility."

Story 3: PCI DSS and the Cloud Cardholder Data Environment

Year: 2021 Client: E-commerce platform, 340 employees Cloud: AWS Situation: Failed QSA assessment, potential loss of payment processing capability

I've done more PCI DSS assessments than I can count, and cloud environments consistently produce the most complex scoping discussions. This client had engaged me to help them prepare for their Level 1 assessment—required because they processed over 6 million transactions annually.

Their CDE (cardholder data environment) was theoretically segmented in AWS. Theoretically.

When we traced data flows, we found cardholder data touching 23 AWS services. They had defined scope as 8 services. The other 15? Nobody had traced the data flows to realize they were in scope.

PCI DSS Cloud Scope Expansion Discovery:

Service Initially Out of Scope

Data Flow Discovery

PCI DSS Controls Required

Additional Controls Needed

Implementation Effort

AWS Lambda functions

Processed tokenization requests

All applicable v4.0 controls

Function-level access control, logging, testing

160 hours

Amazon SQS queues

Transmitted order data including PANs

Queue encryption, access control, monitoring

Encryption enforcement, IAM redesign

80 hours

Amazon SNS

Notification messages contained last 4 digits

Access control, logging

Scope expansion documentation

40 hours

AWS CloudWatch

Logs contained PAN fragments

Log encryption, access control

Log scrubbing, encryption

120 hours

Amazon S3 (additional 7 buckets)

Backup data including transaction records

Encryption, access control, lifecycle

Encryption remediation, IAM

200 hours

Amazon Redshift

Analytics warehouse with transaction data

Full CDE controls

Encryption, access control, monitoring

240 hours

AWS Glue

ETL jobs processing transaction data

Data handling requirements

Access control, logging

80 hours

Total scope expansion

15 additional services

Full CDE controls

920 hours remediation

~$235,000 consulting + 5 months

The assessment had to be completely rescheduled. They narrowly retained their payment processing capability through an emergency remediation program.

Total additional cost from the scope misunderstanding: $780,000 including rescheduled assessment fees, remediation, and revenue impact during the remediation period.

Story 4: ISO 27001 Multi-Cloud Certificate Nightmare

Year: 2024 Client: Global logistics software company, 1,800 employees Cloud: AWS + Azure + GCP (multi-cloud) Situation: ISO 27001 certification scope challenges

This is a more nuanced story—less disaster, more expensive lesson in scope management. The client was pursuing ISO 27001 certification for their global operations. Their IT environment was genuinely complex: AWS for North America, Azure for Europe, GCP for APAC.

Each cloud had different native security tools. Different logging formats. Different IAM models. Different compliance documentation.

The ISO 27001 auditors required unified evidence across all three clouds demonstrating the same controls. Building that unified evidence model took 8 months and $680,000 when it should have taken 4 months and $290,000.

Multi-Cloud Complexity Cost Analysis:

Control Area

Single Cloud Effort

Multi-Cloud Reality

Multiplier

Cost Difference

Asset inventory & CMDB

3 weeks

12 weeks

4x

+$45,000

Configuration baseline documentation

2 weeks per environment

3 different formats, 9 weeks total

4.5x

+$35,000

Log aggregation & SIEM normalization

4 weeks

18 weeks

4.5x

+$70,000

Access control evidence collection

2 weeks

8 weeks (3 different IAM systems)

4x

+$30,000

Vulnerability management unified reporting

3 weeks

14 weeks (3 scanners, normalization)

4.7x

+$55,000

Compliance monitoring dashboards

4 weeks

16 weeks

4x

+$60,000

Penetration testing scoping

1 week

6 weeks (CSP coordination for each)

6x

+$25,000

Network segmentation documentation

2 weeks

10 weeks

5x

+$40,000

Total additional effort

21 weeks base

93 weeks actual

4.4x average

+$360,000

The lesson? Multi-cloud significantly multiplies compliance complexity. If you're going multi-cloud, build your governance model first. Security architecture second. Workload migration third.

They got the certification. But at nearly 2.5x the original budget.

The Cloud Risk Register: Building Your Foundation

Every cloud compliance program needs a comprehensive risk register that accounts for cloud-specific risks. After years of building these, I've developed a standard cloud risk taxonomy that maps directly to compliance requirements.

Cloud Risk Register Framework

Risk Category

Specific Risk

Likelihood (1-5)

Impact (1-5)

Risk Score

Compliance Frameworks Affected

Recommended Controls

Data Exposure

Misconfigured S3/Blob/GCS bucket

4

5

20 (Critical)

All frameworks

Bucket policy automation, public access blocking, CSPM alerts

Data Exposure

Unencrypted sensitive data at rest

3

5

15 (High)

All frameworks

Encryption enforcement via policy, key management program

Access Control

Overprivileged IAM roles

5

4

20 (Critical)

All frameworks

Least privilege implementation, quarterly access reviews

Access Control

Leaked cloud credentials (API keys, secrets)

3

5

15 (High)

All frameworks

Secrets management, credential scanning in CI/CD

Access Control

No MFA on cloud console

4

5

20 (Critical)

All frameworks

Mandatory MFA enforcement via SCP/Policy

Logging & Monitoring

CloudTrail/Activity logs disabled

3

4

12 (High)

All frameworks

Logging baseline policy, CloudTrail org-level enable

Logging & Monitoring

Insufficient log retention

4

3

12 (High)

SOC 2, PCI, HIPAA, ISO

Automated archival, retention policy enforcement

Logging & Monitoring

No alerting on critical events

4

4

16 (Critical)

All frameworks

SIEM integration, alert rules, incident response

Network Security

Overly permissive security groups (0.0.0.0/0)

4

4

16 (Critical)

All frameworks

Security group baseline, CSPM continuous monitoring

Network Security

No network segmentation

3

4

12 (High)

All frameworks

VPC design, VLAN segmentation, microsegmentation

Network Security

Unencrypted data in transit

3

5

15 (High)

All frameworks

TLS enforcement policy, certificate management

Vulnerability Management

Unpatched cloud workloads

4

4

16 (Critical)

All frameworks

Automated patching, vulnerability scanning program

Vulnerability Management

Vulnerable container images

4

4

16 (Critical)

All frameworks

Container image scanning in pipeline, base image policy

Change Management

Uncontrolled infrastructure changes

4

3

12 (High)

All frameworks

IaC enforcement, change control process

Data Sovereignty

Data stored in non-compliant regions

2

5

10 (High)

GDPR, HIPAA, ISO

Data residency policy, region restrictions via SCP

Third-Party Risk

Shadow IT cloud usage

4

3

12 (High)

All frameworks

Cloud access security broker (CASB), SaaS discovery

Business Continuity

No cloud DR testing

3

4

12 (High)

All frameworks

DR runbooks, quarterly restore testing

Compliance

Cloud scope underestimation

5

4

20 (Critical)

All frameworks

Comprehensive data flow mapping, quarterly scope review

Compliance

Outdated shared responsibility understanding

4

4

16 (Critical)

All frameworks

Annual training, responsibility matrix reviews

Compliance

Insufficient vendor due diligence on CSPs

3

3

9 (Medium)

SOC 2, ISO, HIPAA

Annual CSP assessment review, service-specific evaluation

Building the Cloud Compliance Technical Architecture

Here's where theory meets reality. Knowing what you're responsible for is step one. Actually implementing it is step two. And implementing it in a way that satisfies multiple compliance frameworks simultaneously? That's the art.

The Seven-Layer Cloud Compliance Architecture

I use a seven-layer model when designing cloud compliance programs. Each layer corresponds to specific controls, specific compliance requirements, and specific evidence.

Layer 1: Identity & Access Foundation

Control

Implementation

AWS Service

Azure Service

GCP Service

Evidence Generated

Frequency

Centralized identity management

SSO integration with cloud console

AWS IAM Identity Center

Azure AD/Entra ID

Cloud Identity

SSO configuration docs, user provisioning logs

Quarterly review

MFA enforcement

Hardware token or authenticator app required

IAM policy, SCPs

Conditional Access

Organization Policy

MFA enrollment reports, authentication logs

Monthly

Least privilege access

Role-based access with just-in-time elevation

IAM Roles, Permission Boundaries

RBAC + PIM

IAM + IAP

Role definitions, access reviews, entitlement reports

Quarterly

Service account management

Automated rotation, minimal permissions

IAM service roles

Managed identities

Service accounts

Service account inventory, key rotation logs

Monthly

Privileged access monitoring

Enhanced logging for admin actions

CloudTrail + Security Hub

Defender for Cloud

Security Command Center

Admin action logs, anomaly alerts

Real-time

Layer 2: Data Protection Architecture

Control

Implementation

Technical Approach

Evidence Required

Compliance Mapping

Data classification

Automated tagging based on content

Macie / Purview / DLP

Classification reports, tag inventories

ISO A.8.2, HIPAA §164.308(a)(3)

Encryption at rest

Service-managed + customer-managed keys

KMS/AKV/Cloud KMS

Encryption status reports, key audit logs

All frameworks

Encryption in transit

TLS 1.2+ enforced, certificates managed

ACM/Key Vault/Certificate Manager

TLS scan results, certificate inventory

All frameworks

Data residency enforcement

Region restrictions via policy

SCPs/Azure Policy/Org Policy

Region configuration evidence, data flow diagrams

GDPR, HIPAA, ISO

Key management program

HSM-backed keys, rotation schedule

CloudHSM/Managed HSM/Cloud HSM

Key rotation logs, key inventory

PCI Req 3, ISO A.10

Data loss prevention

DLP policies for sensitive data categories

Macie/Microsoft Purview/DLP

DLP policy configuration, alert logs

HIPAA, PCI, GDPR

Layer 3: Network Security Architecture

Control

Implementation

Evidence Generated

Compliance Requirement

Common Failures

Network segmentation

VPCs/VNets with subnet isolation

Network diagrams, segmentation test results

PCI Req 1, ISO A.13, SOC 2 CC6.6

Flat networks, missing microsegmentation

Security group / NSG management

Restrictive baseline, change control

Security group configurations, change tickets

All frameworks

0.0.0.0/0 rules, stale rules

Network flow logging

VPC Flow Logs / NSG Flow Logs enabled

Flow log data, retention verification

SOC 2 CC7.2, ISO A.12.4, PCI Req 10

Logs disabled, insufficient retention

WAF implementation

Web application firewall for internet-facing

WAF rule sets, blocked request logs

PCI Req 6.4, SOC 2 CC6.6

Missing WAF, permissive rule sets

DDoS protection

Platform-level DDoS protection enabled

DDoS protection status, incident reports

ISO A.13.1, SOC 2 A1.1

Relying on default protection only

Private connectivity

Private endpoints for service access

Private endpoint configurations

ISO A.13.1, HIPAA §164.312(e)

Public endpoints for data services

Layer 4: Logging & Monitoring Infrastructure

Log Source

What Must Be Captured

Retention Requirement

Compliance Driver

Alert Threshold

Management API logs (CloudTrail/Activity Log)

All API calls including identity, source IP, targets

12-24 months

PCI Req 10.7, SOC 2 CC7.2, ISO A.12.4

Failed auth, admin actions, policy changes

Resource configuration logs

Configuration changes to all in-scope resources

12 months

ISO A.12.1.2, PCI Req 10.2.7

Unauthorized changes, security group modifications

Authentication logs

Successful and failed login attempts, MFA events

12 months

All frameworks

Failed login spikes, impossible travel, MFA bypass

Network flow logs

Source/dest IPs, ports, protocols, accept/reject

90 days minimum

PCI Req 10, ISO A.12.4

Unusual outbound, lateral movement patterns

Data access logs

Access to sensitive data stores (S3, databases)

12-24 months

HIPAA §164.312(b), PCI Req 10.2.1

Bulk data access, after-hours access, new IP access

Application logs

Application errors, user actions, security events

90 days minimum

SOC 2 CC7.2, ISO A.12.4

Error spikes, authentication failures

Vulnerability scanner output

Findings, severity, remediation status

12 months

All frameworks

Critical/High findings, unresolved aging findings

Change management records

Infrastructure changes tied to approved tickets

12 months

All frameworks

Unplanned changes, changes without tickets

Layer 5: Vulnerability & Patch Management

Workload Type

Scanning Frequency

Scanning Method

Patch SLA (Critical)

Patch SLA (High)

Evidence Required

Virtual machines

Weekly authenticated scan

Inspector/Defender/Security Command Center

7 days

30 days

Scan reports, remediation tracking, exceptions

Container images

Every build + weekly registry scan

ECR scanning/ACR scanning/Container Analysis

Before deployment

7 days

Scan results, image signing evidence

Serverless functions

Code scanning + dependency analysis

Inspector/Defender/Container Analysis

Before deployment

14 days

Code scan reports, dependency reports

Managed databases

Platform-managed + configuration scanning

Inspector/Defender for SQL/Security Command Center

Platform managed

7 days for config

Platform patch logs, configuration compliance reports

Network devices

Configuration scanning

Network assessment tools

Immediate

7 days

Configuration scan reports

Third-party SaaS

Vendor patch notification review

Vendor security bulletins

Per vendor SLA

Per vendor SLA

Vendor notifications, acknowledgment records

Layer 6: Incident Response & Forensics

Cloud incident response is fundamentally different from on-premises response. Evidence is ephemeral. Logs can be deleted. Infrastructure can be terminated before you capture forensic images.

I learned this the hard way during a 2020 incident at a financial services client. We needed forensic images of compromised EC2 instances. By the time we realized what was needed, auto-scaling had terminated the instances and launched fresh ones. Evidence: gone.

Cloud Incident Response Capability Requirements:

Capability

AWS Implementation

Azure Implementation

GCP Implementation

Compliance Requirement

Readiness Level

Automated log preservation

S3 log archival, CloudTrail + S3 versioning

Storage Account lock, Activity Log export

GCS with retention locks

All frameworks

Must have before incident

Instance/VM snapshot automation

EBS snapshot automation

Azure Backup automation

Persistent disk snapshots

ISO A.16, SOC 2 CC7.3

Must have before incident

Network isolation capability

Security group automation, VPC ACLs

NSG automation, Network Watcher

Firewall rule automation

All frameworks

Runbook required

Forensic analysis environment

Dedicated forensic VPC, EC2 Image Builder

Forensic subscription, Azure VMs

Forensic project, isolated GCE

ISO A.16.1.7

Pre-built recommended

Escalation & notification procedures

SNS alerts, Security Hub findings

Microsoft Sentinel, Teams integration

Security Command Center notifications

HIPAA, PCI, GDPR

Documented and tested

CSP liaison process

AWS Support contacts, TAM engagement

Microsoft Security Response Center

Google Cloud Security contacts

All frameworks

Contacts documented

Evidence chain of custody

S3 Object Lock, CloudTrail integrity

Storage immutability, Activity Log tamper protection

GCS retention policies, audit logs

Legal/forensic requirements

Required for legal action

Layer 7: Continuous Compliance Monitoring

This is the layer that separates mature cloud compliance programs from reactive ones. Continuous compliance monitoring means you know your compliance posture in real time—not six months before an audit.

Monitoring Area

Tool/Service

Check Frequency

Alert Threshold

Compliance Metric

Dashboard

Cloud Security Posture (CSPM)

AWS Security Hub / Microsoft Defender CSPM / SCC

Real-time

Critical findings immediate

% resources in compliance

Executive dashboard

Encryption compliance

AWS Config rules / Azure Policy / GCP Policy

Real-time

Any unencrypted resource

% encrypted resources

Technical dashboard

IAM access reviews

Custom automation, access analyzer

Daily

Overprivileged accounts

% compliant IAM entities

Security team dashboard

Network compliance

Config rules / Azure Policy / GCP Policy

Real-time

Public exposure of sensitive workloads

% compliant security groups

Network team dashboard

Logging completeness

Config rules / Monitoring

Real-time

Any log source disabled

% of required logs enabled

SOC dashboard

Patch compliance

Inspector / Defender / SCC

Daily

Critical vulnerabilities unpatched

% patched within SLA

Ops dashboard

Cost governance (security correlation)

Cost anomaly + security correlation

Daily

Anomalous resource creation

Unauthorized resource index

Finance + security dashboard

Third-party compliance

GRC platform integration

Weekly

Overdue vendor assessments

% vendors assessed within cycle

Compliance team dashboard

The Compliance Framework-Specific Cloud Implementation Guide

ISO 27001 in the Cloud: What Auditors Actually Check

I've been through 23 ISO 27001 cloud audits as either the lead implementer or the assessor. Here's what they actually focus on.

ISO 27001 Cloud Implementation Checklist:

Annex A Control

Cloud Interpretation

Common Finding

Typical Remediation

Evidence Requirement

A.5.1.1 – Information Security Policies

Cloud-specific policy addenda required

Policies don't address cloud

Cloud addendum to all security policies

Policy documents with approval dates

A.6.1.2 – Segregation of Duties

Separation of cloud accounts and roles

Single team controls everything

Multi-account strategy, role separation

IAM role definitions, account structure

A.8.1.1 – Inventory of Assets

All cloud resources inventoried

No CMDB or incomplete inventory

CSPM tools + automated discovery

Asset inventory report, CMDB records

A.9.1.2 – Access to Networks

Network access controls documented

Default VPC usage, no design doc

Network architecture documentation

Network diagrams, access control procedures

A.9.4.2 – Secure Log-On Procedures

MFA for all cloud console access

No MFA policy or enforcement

IAM policy enforcement, SCP

MFA enrollment evidence

A.10.1.1 – Policy on Cryptographic Controls

Encryption policy covering cloud

Generic policy not cloud-specific

Cloud-specific encryption standard

Encryption policy, implementation evidence

A.12.4.1 – Event Logging

All required events captured and retained

Missing logs, insufficient retention

CloudTrail/Activity Log configuration

Log configuration evidence, retention settings

A.13.1.3 – Segregation in Networks

Network segmentation implemented

Flat network structure

VPC/VNet redesign with segmentation

Network architecture, test results

A.15.1.1 – Information Security in Supplier Relationships

CSP formally assessed

AWS/Azure/GCP not formally assessed

Annual CSP assessment process

Assessment reports, contract review

A.17.1.1 – Planning IT Continuity

Cloud DR tested

Theoretical BC plan, no testing

DR runbook development, quarterly testing

Test records, RTO/RPO validation

A.18.2.2 – Compliance with Security Policies

Cloud environments monitored for compliance

No continuous monitoring

CSPM deployment, policy automation

CSPM dashboards, compliance reports

SOC 2 in the Cloud: Trust Service Criteria Decoded

SOC 2 is where I see the most cloud-specific failures. The Trust Service Criteria are broadly written, which means the audit firm has significant interpretive latitude.

SOC 2 Cloud Control Environment:

Trust Service Criteria

Cloud-Specific Requirement

Common Gap

Evidence Package Required

Frequency

CC1.2 (COSO Principle 2)

Security accountability assigned for cloud

No cloud security owner designated

Org chart, job descriptions, RACI

Annual review

CC6.1 (Logical access security)

IAM policies restrict access based on roles

Over-privileged IAM

Access control policy, IAM configuration evidence

Quarterly

CC6.2 (New access authorization)

Cloud access provisioning process

No formal provisioning workflow

Provisioning procedure, sample access tickets

Per event

CC6.3 (Access removal)

Automated deprovisioning on termination

Manual, delayed deprovisioning

Termination evidence, deprovisioning records

Per event

CC6.6 (Logical access controls – boundary)

Network-level boundary controls

Permissive security groups

Security group evidence, network diagrams

Monthly

CC6.7 (Encryption and key management)

Encryption for all sensitive data

Partial encryption, poor key management

Encryption status, key management evidence

Monthly

CC7.1 (Vulnerability detection)

Continuous vulnerability scanning

Point-in-time or no scanning

Scan schedules, results, remediation tracking

Quarterly

CC7.2 (Monitoring for anomalies)

SIEM integration, alert rules defined

No alerting or alert fatigue

Alert rule configurations, incident tickets

Monthly

CC7.3 (Incident response evaluation)

Cloud-specific IR procedures

Generic IRP not cloud-adapted

Cloud IRP, tabletop exercise records

Semi-annual

CC8.1 (Change management)

Infrastructure changes controlled

Infrastructure drift, no IaC

Change management records, IaC usage

Per change

CC9.2 (Vendor risk management)

CSP included in vendor risk program

CSP not assessed formally

CSP assessment, annual review records

Annual

A1.1 (Availability)

Uptime SLAs and monitoring

No SLA monitoring

Uptime reports, SLA evidence

Monthly

A1.2 (Recovery)

Cloud DR tested and validated

No DR testing

DR test records, RTO/RPO evidence

Quarterly

PCI DSS v4.0 Cloud Requirements: What Changed and What It Means

PCI DSS v4.0, effective March 2024, made significant changes for cloud environments. I've been implementing v4.0 programs for the past eighteen months. Here's what you need to know.

PCI DSS v4.0 Cloud-Specific Changes:

Requirement

v3.2.1 Approach

v4.0 Cloud Change

Implementation Impact

Evidence Change

Req 2.2 (Configuration standards)

Baseline configs documented

Customized approach option; continuous verification emphasis

Continuous configuration monitoring required

Automated compliance evidence, not point-in-time

Req 6.3.3 (All software components protected from vulnerabilities)

Vulnerability patching program

Explicit container and cloud workload inclusion

Container scanning required in scope

Container scan reports added

Req 8.4.2 (MFA for CDE access)

MFA for remote access

MFA for all CDE access, including cloud console

Console MFA enforcement via SCP/Policy

Extended MFA evidence

Req 10.3 (Audit logs protection)

Log protection measures

Cloud-specific tamper protection emphasized

S3 Object Lock/Storage Immutability required

Immutability configuration evidence

Req 11.3.1 (Internal penetration testing)

Annual penetration testing

Cloud-specific scoping guidance added

Cloud control plane testing now explicit

Cloud-specific pen test scope documentation

Req 12.3 (Targeted risk analysis)

Risk assessment

Cloud assets explicitly included in scope

Cloud risk register formalized

Cloud risk assessment documentation

Req 12.8 (Third-party risk)

Third-party management

Cloud providers explicitly addressed as third parties

Formal CSP assessment program

CSP assessment reports

HIPAA in the Cloud: The BAA Is Just the Beginning

I've helped organizations through 14 OCR investigations related to cloud environments. In 12 of the 14 cases, the organization had a signed BAA with their cloud provider. In all 12, OCR found them non-compliant despite the BAA.

The BAA establishes the contractual relationship. HIPAA compliance requires the technical implementation.

HIPAA Cloud Implementation Matrix:

HIPAA Safeguard

Specific Requirement

Cloud Implementation

BAA Coverage?

Additional Controls Needed

§164.308(a)(1) – Risk Analysis

Annual risk assessment including cloud

Cloud risk assessment methodology

No

Full risk assessment of cloud environment

§164.308(a)(3) – Workforce Clearance

Access authorization for PHI

Cloud IAM role definitions for PHI access

No

PHI-specific role design, access reviews

§164.308(a)(4) – Access Control

Limit PHI access to authorized users

Least privilege IAM, resource policies

No

PHI resource tagging, access boundaries

§164.308(a)(5) – Security Awareness

Training includes cloud security

Cloud-specific HIPAA training modules

No

Annual cloud security awareness training

§164.308(a)(6) – Security Incidents

Response to security incidents

Cloud IR procedures including CSP coordination

Partial (notification)

Cloud-specific incident response procedures

§164.308(a)(7) – Contingency Planning

Backup and recovery plans for PHI

Cloud DR configuration, tested backups

No

DR runbook, quarterly testing

§164.308(b) – Business Associates

BAA with all PHI-accessing vendors

BAA with CSP + sub-processors

CSP BAA available

Sub-processor BAAs, shadow IT assessment

§164.310(a)(1) – Facility Access

Physical access controls

CSP handles physical

Yes (physical)

Rely on CSP, obtain CSP audit reports

§164.310(d)(1) – Device & Media

Hardware management

CSP handles hardware

Yes (hardware)

Cloud media sanitization evidence

§164.312(a)(1) – Access Control

System access controls

IAM, resource policies, network controls

No

Comprehensive IAM implementation

§164.312(a)(2)(iv) – Encryption

PHI encryption required if addressable

Customer-managed encryption

No

Customer-managed keys, encryption policy

§164.312(b) – Audit Controls

Record and examine access to PHI

CloudTrail/Activity Log + data access logs

No

PHI-specific logging, long retention

§164.312(c)(1) – Integrity

PHI not altered or destroyed

Object versioning, integrity checking

No

S3 versioning, integrity verification

§164.312(e)(1) – Transmission Security

Encryption in transit

TLS enforcement

No

TLS policy, certificate management

Cloud Security Posture Management: Your Compliance Baseline

After implementing cloud compliance programs at 47 organizations, I've settled on a non-negotiable truth: you need a Cloud Security Posture Management (CSPM) solution. It's not optional. It's foundational.

CSPM tools continuously assess your cloud environment against security best practices and compliance frameworks. They catch misconfigurations before auditors do. They generate evidence automatically. They track your compliance posture over time.

CSPM Tool Comparison for Compliance

Feature

AWS Security Hub

Microsoft Defender CSPM

GCP Security Command Center

Wiz

Orca Security

Lacework

ISO 27001 Framework

SOC 2 Framework

Limited

PCI DSS Framework

HIPAA Framework

Multi-Cloud Support

AWS only

Azure + multi

GCP + multi

✓ (all)

✓ (all)

✓ (all)

Agentless Scanning

Partial

Partial

Automated Remediation

Limited

Limited

Limited

Limited

Compliance Evidence Export

Container Security

Limited

Approximate Annual Cost (1,000 resources)

$15K-$30K

$25K-$50K

$10K-$25K

$80K-$200K

$60K-$150K

$50K-$120K

Best For

AWS-native environments

Azure-primary environments

GCP environments

Multi-cloud, enterprise

Multi-cloud, mid-market

DevSecOps, multi-cloud

For purely single-cloud environments, start with the native tool. For multi-cloud, a third-party solution is worth the investment.

What CSPM Catches Before Auditors Do

Real findings from CSPM deployments I've managed:

Finding Type

Frequency Observed

Compliance Impact

Average Time to Detect (Without CSPM)

Average Time to Detect (With CSPM)

Publicly accessible S3/Blob/GCS buckets

Every deployment (avg 3-7 per account)

Critical – data breach risk

4-8 months (often at audit)

Real-time alert

Unencrypted EBS volumes / managed disks

60% of deployments

High – encryption compliance

3-6 months

Real-time alert

Security groups with 0.0.0.0/0 rules

Every deployment (avg 8-15 per account)

High – network exposure

2-4 months

Real-time alert

Root account usage without MFA

45% of deployments

Critical – privilege risk

Often never detected

Real-time alert

CloudTrail disabled in regions

35% of deployments

High – audit trail gap

At audit (too late)

Immediate

Overprivileged IAM roles

Every deployment

High – access control failure

Never without review

Weekly report

Publicly accessible databases

25% of deployments

Critical – data breach risk

At breach notification

Real-time alert

Outdated TLS configurations

40% of deployments

Medium-High – encryption compliance

At pen test

Weekly report

Missing resource tagging

Every deployment

Medium – asset management gap

At audit

Daily report

Unmonitored new account creation

55% of deployments

High – shadow IT risk

Often never

Real-time alert

The Cloud Compliance Budget Reality

Let me give you the honest numbers. I've built budgets for 47 cloud compliance programs. Here's what they actually cost.

Cloud Compliance Budget Breakdown

Small Organization (Up to 100 employees, Single Cloud)

Category

Year 1 (Build)

Years 2+ (Maintain)

Notes

CSPM tooling

$15,000-$30,000

$15,000-$30,000/yr

Native cloud tools are cheapest

GRC platform

$15,000-$40,000

$15,000-$40,000/yr

Drata, Vanta, Secureframe

Consulting (implementation)

$80,000-$150,000

$20,000-$40,000/yr

Heavy Year 1, lighter after

Security tooling (SIEM, scanning)

$20,000-$50,000

$20,000-$50,000/yr

Many cloud-native options

Audit & certification

$25,000-$75,000

$20,000-$60,000/yr

Varies by frameworks

Internal labor (FTE equivalent)

$80,000-$120,000

$80,000-$120,000/yr

1 dedicated compliance resource

Training

$5,000-$15,000

$3,000-$8,000/yr

Annual refreshers

Total

$240,000-$480,000

$173,000-$348,000/yr

Mid-Size Organization (100-500 employees, 2 Clouds)

Category

Year 1 (Build)

Years 2+ (Maintain)

Notes

CSPM tooling

$60,000-$150,000

$60,000-$150,000/yr

Third-party tool for multi-cloud

GRC platform

$40,000-$80,000

$40,000-$80,000/yr

Mid-tier GRC platforms

Consulting (implementation)

$200,000-$400,000

$50,000-$100,000/yr

Significant Year 1 investment

Security tooling

$60,000-$120,000

$60,000-$120,000/yr

Full security stack

Audit & certification

$75,000-$180,000

$60,000-$150,000/yr

Multiple frameworks

Internal labor (2-3 FTE)

$200,000-$320,000

$200,000-$320,000/yr

Dedicated team

Training

$15,000-$35,000

$8,000-$20,000/yr

Role-based training

Total

$650,000-$1,285,000

$478,000-$940,000/yr

"Cloud compliance isn't a one-time project. It's an ongoing operational capability. Organizations that treat it as a project are perpetually in firefighting mode. Organizations that treat it as an operational capability are perpetually audit-ready."

The 90-Day Cloud Compliance Launch Plan

Based on 15 years of implementations, here's the proven 90-day plan for establishing cloud compliance foundations.

Days 1-30: Discovery and Assessment

Week

Key Activities

Deliverables

Success Criteria

1

Cloud asset discovery and inventory

Complete asset inventory across all cloud accounts

100% of cloud accounts and services documented

1-2

Data flow mapping for sensitive data

Data flow diagrams showing where regulated data lives

All PHI, PAN, and sensitive data flows mapped

2-3

Current state compliance assessment

Gap analysis against all required frameworks

Prioritized gap list with risk ratings

3-4

Shared responsibility mapping

Shared responsibility matrix for your specific environment

Clear ownership for every control

Days 31-60: Foundation Building

Week

Key Activities

Deliverables

Success Criteria

5-6

CSPM deployment and configuration

CSPM operational with compliance dashboards

Critical findings visible, alerting active

5-7

Logging and monitoring implementation

CloudTrail / Activity Log / Audit Logs enabled everywhere

100% log coverage with appropriate retention

6-7

IAM remediation (quick wins)

MFA enforced, root account secured, obvious over-permissions removed

Zero accounts without MFA, no root key usage

7-8

Network security baseline

Security group review, obvious exposures remediated

No 0.0.0.0/0 on sensitive ports, VPC flow logs enabled

Days 61-90: Program Establishment

Week

Key Activities

Deliverables

Success Criteria

9-10

Encryption program

All regulated data encrypted, key management established

100% encryption of sensitive data stores

9-11

Policy and procedure development

Cloud-specific policy addenda, cloud IRP

Policies approved by leadership

10-12

Evidence collection automation

Automated evidence feeding into GRC platform

70%+ of evidence collected automatically

11-12

Governance structure

Cloud governance committee, operating cadence

First governance meeting held, KPIs defined

12

Board / executive readiness report

Executive cloud compliance posture dashboard

Leadership understands posture and roadmap

The Closing Reality Check

In 2023, I was asked to speak at a cloud security conference in San Francisco. My topic: "Why Cloud Certification Doesn't Mean Cloud Compliance." I expected the usual polite audience of 40-50 people.

The room had 340 people standing against the walls.

Because this issue is everywhere. Every industry. Every size organization. Every cloud platform. The misunderstanding of shared responsibility is the most expensive and most common mistake in cloud security today.

After I finished, a CISO from a Fortune 500 company pulled me aside. "We've been operating in AWS for six years," he said. "We have AWS's SOC 2 report. We assumed we were covered for our own SOC 2."

"Have you had your first SOC 2 audit yet?" I asked.

He nodded slowly. "Next quarter."

"Call me after," I said.

He called me three months later. They had 67 findings.

Every single finding was customer responsibility—not AWS's.

The cloud is not a compliance solution. It's a powerful infrastructure platform that shifts your security work, not eliminates it. Your data security is still your responsibility. Your access controls are still your responsibility. Your configurations are still your responsibility.

AWS handles the lock on the data center door.

You handle the lock on your database.

The shared responsibility model isn't a loophole or a technicality. It's a fundamental design principle of cloud architecture. Understanding it—really understanding it—is the difference between thinking you're compliant and actually being compliant.

And in the world of HIPAA investigations, PCI DSS assessments, SOC 2 audits, and ISO 27001 certifications, that difference is worth millions.

Lock the door.


Trying to navigate cloud compliance across multiple frameworks? At PentesterWorld, we've helped 47 organizations build cloud compliance programs that actually work—not just on paper, but in the auditor's evidence request spreadsheet. Subscribe to our newsletter for weekly practical insights from the cloud compliance trenches.

Read more: [Cybersecurity Framework Mapping: ISO 27001, NIST, SOC 2, PCI, HIPAA Alignment] | [Multi-Framework Compliance: Managing Overlapping Requirements Efficiently] | [HIPAA Cloud Implementation: Complete Guide] | [SOC 2 Type II: What the Evidence Actually Shows]

99

RELATED ARTICLES

COMMENTS (0)

No comments yet. Be the first to share your thoughts!

SYSTEM/FOOTER
OKSEC100%

TOP HACKER

1,247

CERTIFICATIONS

2,156

ACTIVE LABS

8,392

SUCCESS RATE

96.8%

PENTESTERWORLD

ELITE HACKER PLAYGROUND

Your ultimate destination for mastering the art of ethical hacking. Join the elite community of penetration testers and security researchers.

SYSTEM STATUS

CPU:42%
MEMORY:67%
USERS:2,156
THREATS:3
UPTIME:99.97%

CONTACT

EMAIL: [email protected]

SUPPORT: [email protected]

RESPONSE: < 24 HOURS

GLOBAL STATISTICS

127

COUNTRIES

15

LANGUAGES

12,392

LABS COMPLETED

15,847

TOTAL USERS

3,156

CERTIFICATIONS

96.8%

SUCCESS RATE

SECURITY FEATURES

SSL/TLS ENCRYPTION (256-BIT)
TWO-FACTOR AUTHENTICATION
DDoS PROTECTION & MITIGATION
SOC 2 TYPE II CERTIFIED

LEARNING PATHS

WEB APPLICATION SECURITYINTERMEDIATE
NETWORK PENETRATION TESTINGADVANCED
MOBILE SECURITY TESTINGINTERMEDIATE
CLOUD SECURITY ASSESSMENTADVANCED

CERTIFICATIONS

COMPTIA SECURITY+
CEH (CERTIFIED ETHICAL HACKER)
OSCP (OFFENSIVE SECURITY)
CISSP (ISC²)
SSL SECUREDPRIVACY PROTECTED24/7 MONITORING

© 2026 PENTESTERWORLD. ALL RIGHTS RESERVED.