AuditabilityâââA litmus test for cloud adoption maturity
Auditability — A litmus test for cloud adoption maturity
Collaborating with a broad spectrum of businesses representing diverse sizes and domains for a prominent cloud provider like AWS reveals industry trends, notably cloud adoption strategies and maturity levels.
Applied actions provide a convenient perspective for adoption evaluation.
Materialised patterns appear driven by a blend of client preferences and best-practice recommendations. Interestingly, conventions do not always align with organisation size or domain. For example, numerous security measures are equally relevant regardless of classification. Forming a well-architected multi-account landing zone foundation for AWS usage is now a prerequisite. This arrangement supports efficient and effective control realisation irrespective of the number of accounts under management. Adoptin g AWS services such as AWS SecurityHub, Amazon GuardDuty, and Amazon Inspector is commonplace, as they perform vital functions like centralised security posture oversight, intrusion detection, and vulnerability scanning. Applied actions provide a convenient perspective for adoption evaluation. The focus is typically on preventative and detective controls, followed by mechanisms supporting automatic remediation as maturity levels increase.
Information is gathered and stored verbatim with little post-processing, contextualisation or insight.
One area not portraying as much emphasis as 'top of mind' concerns like security is auditability. The attention normally directed at platform observability, telemetry capture, and archiving per regulatory and compliance requirements partially address this non-functional factor. Information is gathered and stored verbatim with little post-processing, contextualisation or insight. This content requires manual scrut iny during an eventual assessment. For example, convention within AWS stipulates the definition of a centralised log archive account. This secure location houses log streams that originate from across a landing zone. These audit trails enable the retrospective review and forensic analysis activities but depict unedited 'raw' source material.
Maintaining an audit-ready posture denotes an evolution within the auditing domain. This form requires continual assessments that survey controls for information technology systems, regulatory compliance, accounting practices and operational procedures. In addition, the approach relies on technology to foster repeatable and fully automated processes with real-time verification and error checking. As a result, pursuant organisations stand to realise benefits like:
- Simplify remediation processes via prompt detection of non-compliance, thereby reducing the risk of financial loss or reputational damage.
- Maintain an audi t-ready posture that lessens audit process costs and improves efficiency.
- Continual feedback loops focused on anomaly detection lead to control definition and application improvement.
- Track Service Level Agreement (SLA) compliance through chronologically assessing and recording Service Level Indicators (SLIs).
- Improve underlying monitoring process efficiency.
Anecdotal evidence suggests that adoption rates are low, thus potentially signifying a lack of process maturity.
To this end, AWS released a service called AWS Audit Manager nearly two years ago to aid ongoing appraisals. Yet, anecdotal evidence suggests that adoption rates are low, thus potentially signifying a lack of process maturity. AWS Audit Manager continually reviews AWS operations to simplify compliance and risk appraisal against industry standards and regulations. The service offers the following features:
- AWS usage to control mapping — frameworks representing named groupings of controls that either automatically leverage AWS Security Hub, AWS Config, AWS CloudTrail, and AWS API calls as data sources or are manual. The tool serves both predefined and custom variants. Predefined frameworks denote prominent compliance standards and regulations such as General Data Protection Regulation (GDPR), System and Organisation Controls (SOC) 2, Payment Card Industry Data Security Standard (PCI DSS), and Health Insurance Portability or Accountability Act (HIPAA). Custom frameworks are created from scratch or by employing an existing instance. For example, there is no option for recurring Infosec Registered Assessors Program (IRAP) reviews. IRAP helps Australian Government customers validate control effectiveness and define suitable responsibility models for handling the requirements specified in the Australian Government Information Security Manual (ISM) produced by the Australian Cyber Security Centre (ACSC). Using AWS Audit Manager, stipulating a custom framework to sustain the automated and manual aspects of a customer's unique IRAP provisions is easily achieved.
- Control efficacy assessment — checks the operational effectiveness of controls depicting policies, procedures, and activities.
- Evidence collection automation — saves time by automatically gathering proof demonstrating compliance status, thus eliminating the burden associated with traditional 'last-minute' manual efforts.
- Optimised team collaboration — facilitates audit stakeholder cooperation, for example, by delegating control assessment to Subject Matter Experts (SMEs) for review.
- Audit-ready report production — continual evidence collection and storage provides the information source required to produce audit reports for assessments. Each document b egins with a high-level overview incorporating a report summary and a synopsis of the assessment process that drove its composition, followed by a Table of Contents (TOC) for navigation. Selecting a hyperlink for a control within the TOC takes a reader to the corresponding section containing a detailed breakdown of its evidence. Links for automatically gathered evidence redirect to PDF files containing granular details, while those for manually assembled proof revert to S3 buckets holding supplementary information.
- Evidence and report integrity assurance — secure access-controlled locations such as S3 buckets can store evidence and other audit-related artifacts. For example, the admittedly inadequately named Log Archive Account represents a logical destination for resultant audit reports. AWS Audit Manager also delivers report file checksums that assure disclosed evidence remains unaltered.
- Review-related notifications — generates notifications for workflow events like designating a control for review, as a delegate reassigns an inspected authority back to the audit owner, or when the audit owner closes the assessment. Notifications can be transmitted via email or to destinations like shared channels within collaboration platforms like Teams or Slack using AWS Simple Notification Service (SNS) topics.
- Changelog for audit process tracking — records all appraisal activity for a given control. This audit trail logs actions like assessment creation, editing, completion or deletion, control set delegation for review, evidence uploading, control status changes and report generation.
Similarly, its features will continue to evolve as adoption rates increase.
AWS Audit Manager portrays an evolution in cloud adoption maturity as it relies on a well-formed AWS foundation and the appropriate use of services like AWS SecurityHub, AWS Config, an d AWS CloudTrail to sustain scalable governance and security controls. The service also integrates with complimentary features like AWS Backup Audit Manager, which supports maintaining and demonstrating data protection compliance within the context of the AWS Backup service.
AWS Audit Manager's functionalities will continue to evolve as adoption rates increase. For example, deficiencies exist in its interoperability with monitoring-related services like AWS Resilience Hub, which continuously tracks application response to failure in terms of metrics such as Recovery Point Objective (RPO) and Recovery Time Objective (RTO). Resultant measures are pertinent for SLA compliance verifications. In addition, AWS Resilience Hub leverages another service called AWS Fault Injection Simulator (FIS). This Chaos Engineering facility offers pre-emptive simulations of real-world failures, confirming application behavioural expectations.
Auditability gains do not traditionally motivat e shifts to the public cloud. However, this quality attribute represents a natural expression of technology usage, form and governance.
Ironically, critically assessing maturity in this dimension indirectly appraises other more immediate concerns.
Originally published at https://www.linkedin.com.
Auditability — A litmus test for cloud adoption maturity was originally published in Towards AWS on Medium, where people are continuing the conversation by highlighting and responding to this story.
Comments
Post a Comment