Compliance Frameworks
The GovTech Multicloud Platform is designed to meet government-grade security and compliance requirements:CIS AWS Foundations
v1.4.0 BenchmarkBest practices for AWS security configuration
AWS Best Practices
Foundational SecurityContinuous monitoring of AWS security controls
FISMA Ready
Federal RequirementsGovernment-grade security controls for US agencies
FedRAMP Ready
Cloud AuthorizationCloud service provider security assessment framework
AWS Security Hub
Security Hub provides a centralized dashboard for all security findings:Enabled Standards
- CIS AWS Foundations v1.4.0
- AWS Foundational Security Best Practices
Automated Checks:
IAM Controls (17 checks)
IAM Controls (17 checks)
- Password policy requirements (min 14 characters, complexity)
- MFA enabled for all users
- Root account MFA enabled
- No root account access keys
- Access keys rotated every 90 days
- Unused credentials removed within 90 days
- IAM policies attached to groups, not users
Logging & Monitoring (15 checks)
Logging & Monitoring (15 checks)
- CloudTrail enabled in all regions
- CloudTrail log file validation enabled
- S3 bucket access logging enabled
- CloudWatch log metric filters for security events
- VPC Flow Logs enabled
- AWS Config enabled
Network Security (8 checks)
Network Security (8 checks)
- Default security groups block all traffic
- Security groups don’t allow 0.0.0.0/0 ingress
- VPCs have route tables properly configured
- No unused network ACLs or security groups
Data Protection (12 checks)
Data Protection (12 checks)
- EBS volumes encrypted
- RDS instances encrypted at rest
- S3 buckets not publicly accessible
- S3 bucket versioning enabled
- KMS key rotation enabled
Viewing Security Hub Findings
CloudTrail Auditing
CloudTrail records every API call made in the AWS account for complete audit trails:What CloudTrail Logs
- IAM Events
- Resource Changes
- Data Access
User and Role Activity:Tracked Actions:
- User login attempts
- Role assumptions
- Access key creation/deletion
- Policy changes
- MFA device changes
Common Audit Queries
GuardDuty Threat Detection
GuardDuty uses machine learning to detect threats in real-time:Threat Categories
Network Threats
Network Threats
Backdoor Activity:
- Pod communicating with known botnet IPs
- Outbound traffic to cryptocurrency mining pools
- DNS queries to malicious domains
Credential Compromise
Credential Compromise
Suspicious Access:
- AWS credentials used from unusual location
- API calls from Tor exit nodes
- Multiple failed login attempts
- Access keys used from multiple IP addresses simultaneously
Data Exfiltration
Data Exfiltration
Unusual Data Transfer:
- Large S3 downloads to unfamiliar IP
- RDS snapshot shared with external account
- EBS snapshot copied to different region
Kubernetes Threats
Kubernetes Threats
EKS-Specific Detections:
- Privileged container launched
- Anonymous API requests to Kubernetes API
- ServiceAccount token abuse
- Pod communicating with crypto mining service
Reviewing GuardDuty Findings
Audit Procedures
Daily Security Checks
Weekly Security Review
Weekly Security Checklist
Weekly Security Checklist
- Review all GuardDuty findings from past week
- Check for users without MFA enabled
- Verify no public S3 buckets
- Review IAM access keys older than 90 days
- Check CloudWatch alarms (any triggered?)
- Review WAF blocked requests
- Verify CloudTrail is logging to S3
- Check for unused security groups
- Review VPC Flow Logs for denied traffic
- Validate backup procedures executed successfully
Monthly Compliance Audit
CloudWatch Alarms
The platform has automated alarms for critical security events:Configured Alarms
- Root Account Usage
- Cost Anomaly
Alarm:
govtech-root-account-usage-prodTrigger: Root account used for any actionSeverity: CRITICALResponse:- Immediate investigation required
- Verify legitimacy with account owner
- If unauthorized, rotate root credentials
- Enable MFA if not already active
Incident Response
Security Incident Playbook
Detection & Triage
Immediate Actions:
- Confirm incident is genuine (not false positive)
- Assess severity (Critical, High, Medium, Low)
- Document initial findings
- Notify security team
- What resource is affected?
- When did the incident occur?
- What is the potential impact?
- Is data at risk?
Investigation
Gather Evidence:Document:
- Timeline of events
- Affected resources
- Data accessed or exfiltrated
- Attack vector
Eradication
Remove Threat:
- Terminate compromised instances
- Revoke all credentials for affected users
- Patch vulnerabilities exploited
- Remove backdoors or malware
Recovery
Restore Normal Operations:
- Deploy clean instances
- Restore from known-good backups
- Issue new credentials
- Verify security controls
Compliance Reporting
Generate Compliance Reports
Monthly Security Report Template
Monthly Security Report Outline
Monthly Security Report Outline
Executive Summary
- Overall security posture (Green/Yellow/Red)
- Critical incidents (if any)
- Compliance status
- GuardDuty findings: X critical, Y high, Z medium
- Security Hub compliance: XX% passing
- CloudTrail events processed: XXX,XXX
- WAF requests blocked: XX,XXX
- Number of security incidents
- Mean time to detect (MTTD)
- Mean time to respond (MTTR)
- Lessons learned
- Vulnerabilities patched
- Access keys rotated
- Users with MFA enabled
- Security groups hardened
- CIS AWS Foundations: XX% compliant
- AWS Best Practices: XX% compliant
- Outstanding issues
- Remediation plan
- Short-term actions (next 30 days)
- Long-term improvements (next quarter)
Automated Compliance Tools
AWS Config Rules
AWS Config continuously monitors configuration compliance:Prowler (Open Source)
Prowler is an AWS security assessment tool:Next Steps
Security Overview
Review overall security architecture
IAM Policies
Detailed IAM policy documentation