No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

Navigating the Complex World of Cloud Audit and Compliance

Turning to established frameworks and standards can help teams get their arms around cloud audits

by Eric Kedrosky
July 26, 2023
in Cybersecurity, Internal Audit
cloud audit

Almost half of all data breaches take place in the cloud. And it’s little wonder why with the massive migration of enterprise operations to cloud environments. This shift has also brought to light the pressing need for new audit and compliance measures to ensure the security of cloud data. Eric Kedrosky, CISO of Sonrai Security, explores the compliance frameworks and standards you need to know.

The migration of enterprise operations to the cloud has revolutionized the business landscape over the past decade and a half. However, this shift has also brought about a pressing need for new audit and compliance measures to accommodate the cloud landscape. With the explosion of identities, including both human and non-person identities (NPIs) and the distributed ownership of cloud resources across teams, managing identities, access and permissions has become an increasingly daunting challenge. 

Being cloud-compliant means adhering to internal and external requirements, regulatory standards and industry guidelines within a cloud environment. Audits play a crucial role in achieving cloud compliance, whether for internal purposes or to satisfy external regulatory bodies. However, there are unique challenges present in identity-related audits and compliance standards that prove to be difficult.

Just look at the recent news surrounding the Toyota Motor Corp leak, in which Toyota acknowledged that the vehicle data of approximately 2.15 million users was publicly accessible in Japan for nearly a decade. What should have been private cloud data became public. If your cloud audit misses something this significant for months, let alone years, you could find yourself in a very bad situation.

The challenges of cloud audit and compliance

Several factors contribute to the complexity of cloud audit and compliance. First, the exponential growth of identities, both human and machine, makes maintaining control and oversight difficult. Lax permission governance models can leave room for the self-escalation of identity permissions and the creation of new NPIs by intruders in your environment, which can be manipulated and used for their intended action.

Additionally, the insecure provisioning of entitlements in cloud environments exacerbates the risk of unintended inheritance or impersonation. Poor management of secrets further compounds the challenge, as they are often stored in vulnerable locations, susceptible to compromise.

The ever-evolving nature of cloud infrastructure, coupled with the distributed ownership of resources across teams, adds another layer of complexity. Your cloud is constantly changing, making it insufficient to prep one-off for audits, and ownership over identity and access security is a gray area between identity access management teams, cloud teams, security teams and developers. As a result, managing audit questions and keeping up with compliance requirements becomes increasingly arduous.

joining forces
Internal Audit

Why ESG Programs Should Make Internal Audit an Ally

by Kapish Vanvaria
November 30, 2022

Recent research shows internal audit functions are rarely involved in setting strategy for ESG or even in reviewing how goals are tracked and monitored. EY’s Kapish Vanvaria argues that ESG leaders should make friends with their internal audit colleagues — for everyone’s sake.

Read moreDetails

Key compliance frameworks and standards to know

To establish a robust cloud security posture, organizations must align their compliance efforts with industry-standard benchmarks and regulations. Some key cloud compliance standards include:

  • CIS (Center for Internet Security Foundations Frameworks): Benchmarks for the secure configuration of systems
  • PCI DSS (Payment Card Industry Data Security Standard): An information security standard for the processing, storage and transfer of credit card data
  • HIPAA (Health Insurance Portability and Accountability Act): Security and privacy protection for personal healthcare information
  •  ISO 270002 (International Organization for Standardization): Information security management
  • NIST 800-53 (National Institute of Standards and Technology): Security framework for federal agencies and programs
  • HITRUST (Health Information Trust): Control measures and safeguards for private healthcare information (PHI)
  • CSA (Cloud Controls Matrix): A cybersecurity framework for cloud computing

Building a strong foundation

To build a strong foundation for cloud audit and compliance, several key components should be considered. For starters, this should include tracking and collecting every event in the cloud environment by enabling audit logging. This step is critical to ensuring the availability of quality data for evidence gathering. It is crucial to safeguard the collected evidence from unauthorized access, deletion or tampering to protect the audit data.

Clear visibility is also essential. This involves maintaining a unified inventory of identities, data and infrastructure within and across cloud environments. 

Finally, configuring cloud services to align with compliance requirements and maintaining the chain of custody is necessary to establish a robust foundation for cloud audit and compliance. Once you have the right foundational practices in place, audits can be completed without spending unnecessary time and resources.

The power of CSPM and CIEM

While there is no silver bullet solution for cloud audit and compliance, the combination of cloud security posture management (CSPM) and cloud infrastructure entitlement management (CIEM) tools offers significant advantages. CSPM tools, for example, help monitor for misconfigurations and/or changes that cause drift away from compliance. In conjunction, CIEM solutions enable organizations to inventory human and non-human identities in the cloud, determine their entitlements and monitor them for deviations, as well as enforce secure entitlement management when deviations are detected.

By leveraging CSPM and CIEM together, organizations gain comprehensive visibility into cloud posture and identities, reporting capabilities and the ability to address complex audit requirements effectively.

Cloud tools checklist

Successfully navigating cloud audits requires organizations to through the implementation of appropriate tools and processes. This involves setting baseline policies and mapping them to industry-standard frameworks to simplify compliance enforcement. It also entails providing valuable analytics to gain accurate visibility into access permissions and effectively address audit inquiries.

Organizations should be able to support complex questions by leveraging their ability to query cloud data and provide detailed responses to audit questions. Additionally, generating reports that demonstrate compliance alignment and adherence to specific policies is essential.

Continuous monitoring for changes is also crucial when it comes to identifying any access and configuration changes that might impact compliance. By fulfilling these requirements, organizations can navigate cloud audits with confidence and demonstrate their commitment to effective risk management and compliance.

Overcoming challenges

Lastly, when it comes to effectively overcoming cloud compliance challenges, organizations should consider the following strategies:

  1. Take control of your controls: Establish a precise understanding of control implementation in your environment, recognize the characteristics of effective control and have a clear grasp of the signs of control failure.
  2. Show visibility: Demonstrate the ability to monitor and manage security controls effectively.
  3. Always be monitoring: Continuously monitor your cloud environment and ensure alignment with industry-standard frameworks.
  4. Build trust over time: Develop a consistent track record of understanding and proficiently managing controls, to earn auditors’ trust. This involves being adequately prepared ahead of time and providing clear, understandable evidence of your control management practices.

Previous Post

How Autonomy Can Improve Workplace Well-Being

Next Post

Eurovision on Anti-Corruption Programs: Everyone Singing From the Same Songbook?

Eric Kedrosky

Eric Kedrosky

Eric Kedrosky is CISO of Sonrai Security. He has been in the information security industry for almost 20 years building and leading security teams and has been a pioneer in securing the cloud for the past six years. He has experience across the high-tech and fintech industries. He is an active contributor to the information security community by providing thought leadership in cloud security.

Related Posts

drug cartel soldier camo

Leveraging Human Rights Frameworks to Combat Emerging Cartel Risks

by Nate Lankford, Matteson Ellis and Nisha Sawhney-Murkett
May 19, 2025

As enforcement priorities shift to cartels and foreign terrorist organizations, established human rights processes can identify and mitigate emerging legal...

You are now registered!

Webinar: What Employee Experience Reveals About Your E&C Program

by Corporate Compliance Insights
May 16, 2025

11 a.m. - 12 p.m. ET Tuesday, June 3 Are your ethics and compliance metrics capturing what really matters? Programs...

LRN 2025 Program Maturity Global Study

2025 Global Study on Ethics & Compliance Program Maturity

by Corporate Compliance Insights
May 16, 2025

How does your ethics and compliance program measure up? Global study Ethics & Compliance Program Maturity What’s in this global...

check engine light

What Gets Measured Gets Managed, but What Actually Matters in Compliance?

by Keshonda Walker
May 16, 2025

Looking beyond standard measurements to identify the quiet signals that help compliance teams address issues before they become crises

Next Post
european union

Eurovision on Anti-Corruption Programs: Everyone Singing From the Same Songbook?

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights