Compliance
Compliance Frameworks
Auditing standard for service providers storing customer data, focusing on five Trust Service Criteria: Security, Availability, Processing Integrity, Confidentiality, Privacy. Type I (point-in-time) vs Type II (6-12 months). Required for SaaS companies selling to enterprises. Annual audits by certified CPA firms.
US law protecting Protected Health Information (PHI) in healthcare. Requires administrative, physical, and technical safeguards. Business Associate Agreements (BAA) for vendors. Covered entities and business associates must comply. Significant violation penalties. HITECH Act extends requirements to cloud providers.
12 requirements for protecting cardholder data. Includes network security, encryption, access controls, monitoring, security policies. Four levels based on transaction volume. Annual self-assessment or third-party audit. Quarterly network scans by Approved Scanning Vendor (ASV). Non-compliance fines and loss of card processing.
EU regulation for data protection and privacy. Applies to any organization processing EU residents' data. Data subject rights (access, erasure, portability). Breach notification within 72 hours. Data Protection Officer required for large-scale processing. Significant fines based on global revenue. Privacy by design principles.
International standard for Information Security Management Systems (ISMS). Risk-based approach with 114 controls across 14 categories. Requires documented policies, procedures, and continuous improvement. Third-party certification audit. Globally recognized for security excellence. Often prerequisite for government and enterprise contracts.
US government standardized approach for cloud security assessment, authorization, and continuous monitoring. Three impact levels: Low, Moderate, High. Required for cloud services used by federal agencies. Involves third-party assessment organization (3PAO). Authorization to Operate (ATO) process. Reuse of security packages across agencies.
California privacy law giving consumers rights over their personal information. Right to know, delete, opt-out of sale. Applies to for-profit businesses meeting revenue, consumer count, or data sales thresholds. Private right of action for data breaches. Per-violation penalties apply. Model for other US states.
Compliance Requirements
Comprehensive logging of access, changes, and security events for compliance and forensics. Who accessed what data when, configuration changes, authentication events. Immutable logs with tamper-proof storage. Centralized log management (SIEM). Retention policies per compliance requirements (typically 1-7 years). Log analysis for anomaly detection.
Encryption at rest (AES-256 for storage) and in transit (TLS 1.2+ for network). Customer-managed encryption keys (BYOK) for sensitive data. Key rotation policies and HSM protection. Database encryption (TDE), application-level encryption for sensitive fields. Encryption requirements vary by framework (HIPAA, PCI DSS mandate).
Role-Based Access Control (RBAC) with minimum necessary permissions. Multi-Factor Authentication (MFA) for privileged access. Regular access reviews and certification. Separation of duties for critical functions. Just-in-time access for elevated privileges. Automated de-provisioning when employees leave. PAM solutions for privileged accounts.
Documented policies for data lifecycle per compliance and business requirements. Automated retention enforcement with lifecycle policies. Secure deletion ensuring data unrecoverability (cryptographic erasure, physical destruction). Legal hold capabilities suspending deletion. Backup retention separate from production. GDPR requires ability to delete on request.
Documented incident response plan with defined roles, procedures, and communication protocols. Detection, containment, eradication, recovery, post-incident review. Breach notification requirements (GDPR 72 hours, state laws vary). Tabletop exercises and testing. Integration with security operations center (SOC). Evidence preservation for forensics.
Regular vulnerability scanning and penetration testing. Patch management with defined SLAs (critical patches within 30 days). Continuous security monitoring and threat detection. Security updates for OS, applications, and dependencies. Bug bounty programs for external testing. Remediation tracking and verification.
Cloud Compliance
Cloud provider secures infrastructure (hardware, network, facilities), customer secures workloads (data, applications, access). Responsibility varies by service model: IaaS (customer manages more), PaaS (shared), SaaS (provider manages more). Critical to understand division for compliance. Documented in compliance programs and contracts.
Legal requirements for data storage location. GDPR requires EU data in EU. China Cybersecurity Law requires data localization. Russia requires Russian citizen data in Russia. Choose cloud regions matching requirements. Cross-border data transfer mechanisms (Standard Contractual Clauses, Privacy Shield alternatives). Impact on DR and multi-region architectures.
Cloud regions have different compliance certifications. Verify region supports required frameworks (HIPAA, PCI DSS, FedRAMP). AWS Artifact, Azure Compliance Manager, GCP Compliance Reports provide attestations. Not all services available in all compliant regions. Plan architecture considering regional compliance coverage.
Cloud providers maintain compliance certifications and publish reports. SOC 2 Type II reports, ISO 27001 certificates, PCI AOC available to customers. AWS Artifact, Azure Service Trust Portal, GCP Compliance Resource Center. Use provider attestations to inherit controls. Still responsible for workload-specific compliance.
Cloud-native services for continuous compliance monitoring. AWS Config Rules, Azure Policy, GCP Security Command Center. Automatically detect non-compliant resources. Enforce policies preventing non-compliant deployments. Compliance-as-code with automated remediation. Integration with governance frameworks and CI/CD pipelines.
HIPAA requires BAAs with cloud providers and vendors processing PHI. Specifies responsibilities, permitted uses, breach notification. Standard BAAs available from major cloud providers. Required for HIPAA compliance in cloud. Review contract terms for compliance obligations. Extend to all subprocessors in chain.
Data Protection
Information identifying or can be used to identify individual: name, email, SSN, address, phone, IP address, biometrics. Regulated by GDPR, CCPA, state laws. Requires consent, access controls, encryption, breach notification. Minimize collection (privacy by design). Document processing purposes and legal basis. Enable data subject rights.
Health information covered by HIPAA including diagnoses, treatments, insurance, medical records. Identifiable health data requires HIPAA safeguards and BAAs. Minimum necessary principle for access. Breach notification to HHS and individuals. Combine with PII protections. Extra scrutiny for genetic and mental health data.
Categorize data by sensitivity for appropriate controls. Public (no controls), Internal (basic access control), Confidential (encryption, restricted access), Restricted (highest controls, audit trails). Tag resources with classification. Automate controls based on classification. Employee training on handling. DLP tools enforcing policies.
Replace sensitive data with non-sensitive tokens. Tokenization for credit cards, SSN preserving format. Data masking for non-production (static for backups, dynamic for queries). Maintains referential integrity and format. Reduces PCI DSS scope. Enables analytics and testing without exposing sensitive data. Token vault for mapping.
EU data subjects can request deletion of their personal data. Must delete within one month of request. Applies to backups, archives, and third parties. Exceptions for legal obligations or public interest. Requires data discovery capabilities across systems. Automated deletion workflows. Document deletion and provide confirmation.
Mechanisms for legally transferring personal data across borders. GDPR requires adequacy decision or safeguards (Standard Contractual Clauses, Binding Corporate Rules). Privacy Shield invalidated, SCCs v2.0 current mechanism. China Cross-border Data Transfer rules. Impact on multi-region architectures and global services.
