<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Nitesh Saini</title>
    <description>The latest articles on Forem by Nitesh Saini (@niteshsaini).</description>
    <link>https://forem.com/niteshsaini</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F450311%2Ffbe0a35e-9482-4dc0-8e55-a56e8d394d45.jpeg</url>
      <title>Forem: Nitesh Saini</title>
      <link>https://forem.com/niteshsaini</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/niteshsaini"/>
    <language>en</language>
    <item>
      <title>Security Centralization for AWS Multi-account using Native Services</title>
      <dc:creator>Nitesh Saini</dc:creator>
      <pubDate>Mon, 11 Mar 2024 17:16:42 +0000</pubDate>
      <link>https://forem.com/infracloud/security-centralization-for-aws-multi-account-using-native-services-32am</link>
      <guid>https://forem.com/infracloud/security-centralization-for-aws-multi-account-using-native-services-32am</guid>
      <description>&lt;p&gt;Managing security and compliance can be a tough job when we have our infrastructure spread over multiple public cloud accounts. In most organizations, there are dedicated cloud accounts for each product line, and each product line can have multiple environments like development, staging, integration, and production. Keeping separate accounts for various environments is a good strategy to stop the lateral movement in case of any compromise, but managing those multiple accounts is hectic. When we talk about security management, it consists of user management, password policies, detection and protection mechanisms, logging and monitoring, regulatory compliance, responding to events/incidents, recovery, and following best practices. &lt;br&gt;
In this blog post, we will talk about achieving centralization in the AWS public cloud using AWS organization. It has provided us with a lot of native tools that we can utilize to centralize compliance, logging, monitoring, and user &amp;amp; access management through multi-accounts in the organizations. &lt;/p&gt;

&lt;h2&gt;
  
  
  What is AWS Organization?
&lt;/h2&gt;

&lt;p&gt;AWS Organization is a service that enables us to manage and govern multiple AWS accounts centrally. It offers several advantages, such as improved cost control, central security, better governance, and operational efficiency for those with complicated AWS infrastructures. It helps us manage and scale the cloud infrastructure by centralizing control and streamlining administration.&lt;/p&gt;

&lt;h3&gt;
  
  
  Benefits of using AWS organization
&lt;/h3&gt;

&lt;p&gt;There are many advantages of using AWS organization, including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Consolidated billing&lt;/li&gt;
&lt;li&gt;Centralized policy management&lt;/li&gt;
&lt;li&gt;Control over account creation&lt;/li&gt;
&lt;li&gt;Service control policies (SCPs)&lt;/li&gt;
&lt;li&gt;Consistent identity and access management (IAM)&lt;/li&gt;
&lt;li&gt;Delegated administration&lt;/li&gt;
&lt;li&gt;Consolidated compliance reporting&lt;/li&gt;
&lt;li&gt;Resource organization&lt;/li&gt;
&lt;li&gt;Isolation and segmentation&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Organization structure
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzic5ugolcfr1fujxy30l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzic5ugolcfr1fujxy30l.png" alt="Organization structure" width="800" height="585"&gt;&lt;/a&gt;&lt;br&gt;
Organization of accounts is very important as it helps us achieve a structure as per our needs and we can further streamline policy implementation as per the structure defined. We can use multiple approaches to define a structure.&lt;br&gt;&lt;br&gt;
One approach is to categorize accounts of various products into groups like "prod," "sandbox," and so on so that we can easily apply SCPs to different types. Here is an example of this approach.&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0fzv7eegsl0e8o3prpqp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0fzv7eegsl0e8o3prpqp.png" alt="categorize accounts of various products" width="800" height="514"&gt;&lt;/a&gt;&lt;br&gt;
Another approach is to arrange accounts according to projects, and under the projects, we can further use sub-categorization. An example of this approach is shown below:&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4twoigq75j0736e5990m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4twoigq75j0736e5990m.png" alt="arrange accounts according to projects" width="800" height="647"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Delegated admin for AWS Organization
&lt;/h3&gt;

&lt;p&gt;If we wish to manage all the services from a separate account rather than the master/main account, we can delegate the service administration to another account. For example, as seen above, we can create a dedicated account for security and another for logging and monitoring.&lt;br&gt;&lt;br&gt;
To add a delegated admin, we have to go to ‘settings’ under the ‘organization’ console and check which access level we want to delegate. It can be view access just for learning and understanding for the team or some limited read/write access. We can also add on which resources we want the access to be delegated, it can be all resources, some OU under root, or some particular accounts. Additional &lt;a href="https://docs.aws.amazon.com/organizations/latest/userguide/orgs_delegate_policies.html"&gt;details related to the delegation of Organization&lt;/a&gt; can be found in the official AWS documentation. Below are screenshots showing the delegation of services and access levels in the AWS Organization. &lt;br&gt;
&lt;strong&gt;&lt;em&gt;AWS Organizations -&amp;gt; Settings -&amp;gt; Delegated administrator for AWS Organizations -&amp;gt; Create delegation policy&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F577s5y3wh44mkvrg3qko.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F577s5y3wh44mkvrg3qko.png" alt="Delegated admin for AWS Organization" width="800" height="561"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Services managed by AWS Organization
&lt;/h2&gt;

&lt;p&gt;There are, in total, 32 services that can be managed by the AWS organization at the time we are writing this blog post. In this blog post, we are only interested in services that help us to centrally manage controls related to security, compliance, resource, and access management and are categorized as below:&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr444myubr9h16xn4ko7a.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr444myubr9h16xn4ko7a.png" alt="Services managed by AWS Organization" width="800" height="414"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Note&lt;/strong&gt;: One has to make sure that trusted access is enabled from the AWS Organization console for the service that we want to manage centrally. AWS offers many other services under security and compliance, but the key focus of the post is to focus on services that can be centralized for multiple accounts.&lt;br&gt;&lt;br&gt;
&lt;strong&gt;&lt;em&gt;AWS Organizations -&amp;gt; Services -&amp;gt; Service-name -&amp;gt; Enable trusted access&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Below is an example Screenshot for enabling trusted access for AWS Inspector.&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3m5bten7kum22oxaxvk7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3m5bten7kum22oxaxvk7.png" alt="enabling trusted access for AWS Inspector" width="800" height="294"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Service Selection
&lt;/h3&gt;

&lt;p&gt;It is not mandatory that all the pillars must be covered in the baseline or advanced section. These categories are created as per the service offered by AWS as we are only targeting AWS native services.&lt;br&gt;
There are a few services that we identified as a baseline, but to use them with full potential, we have to integrate those services with others. One such example is Security Hub. It gets data from multiple services, and if we have yet to enable those services, the Security Hub will not work to its fullest potential, but it will still work independently to provide some data.&lt;br&gt;&lt;br&gt;
Here are quick picks that can help you to some extent in service selection as per the organization's needs.&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Security Requirement&lt;/strong&gt;   &lt;strong&gt;AWS Service&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Security dashboard --&amp;gt; Security Hub&lt;br&gt;
NIDS --&amp;gt; GuardDuty&lt;br&gt;
Vulnerability scanning --&amp;gt; Inspector&lt;br&gt;
PII data scanning --&amp;gt; Macie&lt;br&gt;
API Logging --&amp;gt; CloudTrail&lt;br&gt;
Patching --&amp;gt; Patch manager from System manager&lt;br&gt;
AWS security posture --&amp;gt; Trusted advisor&lt;br&gt;
Identity federation --&amp;gt; IAM identity center&lt;br&gt;
S3 storage view --&amp;gt; S3 storage lens&lt;br&gt;
Auditing --&amp;gt; Config&lt;/p&gt;

&lt;h2&gt;
  
  
  Baseline services
&lt;/h2&gt;

&lt;p&gt;These are the services one must consider and enable during the initial stages of setting up an account irrespective of compliance or customer requirements. These services require minimal or no additional cost and can be easily set up and managed. &lt;/p&gt;

&lt;h3&gt;
  
  
  AWS IAM and Identity Center
&lt;/h3&gt;

&lt;p&gt;One of the most important components of security is authentication; it acts as the first line of defense  and plays a crucial role in safeguarding digital systems, data, and resources from unauthorized access. When discussing AWS multi-account authentication, we can use the IAM Identity Center, and this will be the initial stage of security, the AWS Identity Center can be very useful as it gives us options to integrate various external identity providers. We have the option to use it with AD (Active Directory), any external identity provider, or we can use the native AWS Identity Center directory for user management and authentication. &lt;br&gt;
We can use a predefined permission set to provide user access or create our custom permission set per our requirements. We have options to define session timeout settings, e.g. for prod, we can set up a session of 1 hour, and for non-prod, it can be 4 hours or as per organization policy. You can visit the docs to &lt;a href="https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html"&gt;learn more about AWS IAM Identity Center&lt;/a&gt;.&lt;br&gt;
Below is an image showing some of the predefined permission sets we can use with AWS Identity Center.&lt;br&gt;&lt;br&gt;
&lt;strong&gt;&lt;em&gt;IAM Identity Center -&amp;gt; Permission sets&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmxbgr5100su35g6k3ix3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmxbgr5100su35g6k3ix3.png" alt="predefined permission sets we can use with AWS Identity Center" width="640" height="834"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  CloudTrail
&lt;/h3&gt;

&lt;p&gt;AWS CloudTrail is an AWS service that helps you enable operational and risk auditing, governance, and compliance of your AWS account. Actions taken by a user, role, or an AWS service are recorded as events in CloudTrail.&lt;br&gt;&lt;br&gt;
By enabling the organization trail, one can centrally manage all the trail logs of all accounts in one place. All the accounts created in the future will be added to this organization trail and all the logs will be collected in the same bucket without any additional effort. You can read the docs to &lt;a href="https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-user-guide.html"&gt;learn more about CloudTrail&lt;/a&gt;.&lt;br&gt;&lt;br&gt;
Steps to enable the org-level CloudTrail are:  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Enable the trusted access from the Organization console&lt;/li&gt;
&lt;li&gt;Create a CloudTrail &lt;/li&gt;
&lt;li&gt;Edit the trail to make it work as an organization trail
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo3o64k0c7v1j3yay8i6r.png" alt="AWS CloudTrail" width="800" height="340"&gt;
By default, the KMS encryption and log file validation are disabled for the CloudTrail. We should enable them by editing the CloudTrail to ensure integrity of the logs.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F92cxmecu5mug583tqoud.png" alt="Enable KMS encryption and log file validation for CloudTrail" width="712" height="849"&gt;
The above CloudTrail setup is good enough for a basic level of org-wide logging, but if someone is looking for more detailed events, they can also enable the insight events in the CloudTrail. Insight events continuously examine CloudTrail management events, and it assists customers in identifying and taking action in response to odd behavior related to API calls and API error rates. CloudTrail Insights examines our typical API request behavior of API volume and API error rates.
&lt;strong&gt;&lt;em&gt;CloudTrail -&amp;gt; Insights&lt;/em&gt;&lt;/strong&gt;
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiszg1vsif2cw9e7g37pn.png" alt="Enable the insight events in the CloudTrail" width="712" height="483"&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  GuardDuty
&lt;/h3&gt;

&lt;p&gt;GuardDuty is a threat detection service that continuously monitors malicious activity and unauthorized behavior to protect our AWS accounts, workloads, and data stored in Amazon S3. It analyzes events across multiple AWS data sources, such as AWS CloudTrail event logs, Amazon VPC Flow Logs, and DNS logs. You can read the docs to &lt;a href="https://docs.aws.amazon.com/guardduty/latest/ug/what-is-guardduty.html"&gt;explore GuardDuty&lt;/a&gt; in detail.&lt;br&gt;&lt;br&gt;
Any account inside the organization may be chosen to serve as the GuardDuty delegated administrator when using GuardDuty with an AWS Organization. Delegated administrators for GuardDuty can only be selected through the organization's management account. Because GuardDuty is a regional service, we must enable it where we want the threat detection service to be available. We can control security features like S3, Kubernetes, and malware scanning from the delegated admin account. We can also automatically enable new accounts (this will enable newly created accounts to account in the organization to be added to GuardDuty).  &lt;/p&gt;

&lt;p&gt;To enable trusted access and delegate GuardDuty administrator we have to go to&lt;br&gt;&lt;br&gt;
&lt;strong&gt;&lt;em&gt;AWS Organizations &amp;gt; Services &amp;gt; Amazon GuardDuty&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
When we proceed further, it will take us to the GuardDuty page shown below, define the Central-Security account ID where you want to delegate the service, and enable attaching relevant permissions as well. Also, enable the GuardDuty in the central management account (the main account where the Organization is set up).&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fusqbd0lb8ki9mwhsyoo3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fusqbd0lb8ki9mwhsyoo3.png" alt="Enable GuardDuty" width="800" height="737"&gt;&lt;/a&gt;&lt;br&gt;
You can navigate to the GuardDuty console in the Central security account, click on Accounts and turn on “Auto Enable” for service. GuardDuty offers us monitoring for several services including S3 protection, Malware monitoring, EKS audit, RDS login activity, and runtime monitoring, depending on the use case or services. We can enable these services via GuardDuty. &lt;br&gt;
All the alerts can be viewed on the central dashboard. The below image has sample alerts from GuardDuty, and the alerts are categorized based on severity, last findings, most common findings, and so on.&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F56aenkahnaygf82fkmw7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F56aenkahnaygf82fkmw7.png" alt="Sample alerts from GuardDuty" width="800" height="454"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Security Hub
&lt;/h3&gt;

&lt;p&gt;Security Hub offers a comprehensive view of your security alerts and security posture across your AWS accounts. It aggregates, organizes, and prioritizes your security alerts, or findings, from multiple AWS services, such as Amazon GuardDuty, Amazon Inspector, Amazon Macie, AWS Identity and Access Management (IAM) Access Analyzer, AWS Systems Manager, AWS Firewall Manager, as well as from AWS Partner Network (APN) solutions.&lt;br&gt;&lt;br&gt;
The Security Hub depends on the aforementioned services to function to its full capacity; if the majority of these services are enabled, it is an advanced service that can work as a single pane of glass for organization-level security. You can read the docs to &lt;a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html"&gt;learn about Security Hub&lt;/a&gt; in detail.&lt;br&gt;&lt;br&gt;
As per AWS, before we enable Security Hub standards and controls, we must first allow resource recording in AWS Config. We must allow resource recording for all of the accounts and in all of the Regions where you plan to allow Security Hub standards and controls.&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbv2b0or2sqhszbm50zmn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbv2b0or2sqhszbm50zmn.png" alt="Security Hub" width="800" height="873"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9g1r3ywyd3fypu4iuknu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9g1r3ywyd3fypu4iuknu.png" alt="Delegated Administrator" width="800" height="249"&gt;&lt;/a&gt;&lt;br&gt;
Along with the aggregation of events from various other services, Security Hub allows us to aggregate all the findings from various regions into a single region. In case we are using multiple regions, we can have a single pane of glass for security alerts/events in a single region.&lt;br&gt;
&lt;strong&gt;&lt;em&gt;Security Hub -&amp;gt; Settings&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8alyghihbvfgzfavuv85.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8alyghihbvfgzfavuv85.png" alt="Security Hub settings" width="800" height="386"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Config
&lt;/h3&gt;

&lt;p&gt;Config is a service that enables you to assess, audit, and evaluate the configurations of your AWS resources. Config continuously monitors and records your AWS resource configurations and allows you to automate the evaluation of recorded configurations against desired configurations. You can read the docs to &lt;a href="https://docs.aws.amazon.com/config/latest/developerguide/WhatIsConfig.html"&gt;learn about Config&lt;/a&gt; in detail.&lt;br&gt;&lt;br&gt;
We can create an AWS aggregator in the delegated account of the organization and all the accounts in that organization that have AWS Config enabled start sending data to the account. It will collect and display the compliance and resource inventory data centrally on the dashboard.&lt;br&gt;
To enable Config centrally, we can use the predefined templates: &lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frmog8ef39nnn2o4nsvip.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frmog8ef39nnn2o4nsvip.png" alt="Enable Config" width="800" height="245"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq70fyz2zpq8geoneznvr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq70fyz2zpq8geoneznvr.png" alt="Specify rule type" width="800" height="617"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fue3jm6pbk712hu9tom8w.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fue3jm6pbk712hu9tom8w.png" alt="Specify template" width="800" height="663"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Amazon Inspector
&lt;/h3&gt;

&lt;p&gt;Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. Amazon Inspector automatically assesses applications for exposure, vulnerabilities, and deviations from best practices. After performing an assessment, Amazon Inspector produces a detailed list of security findings prioritized by level of severity.&lt;br&gt;
Inspector is a regional service, and to assign an administrator and consolidate the Inspector's vulnerability scan results to a single account, the organization management account must be used. Once enabled, we can use this for scanning EC2 instances and ECR container scanning.&lt;br&gt;
Amazon Inspector supports deep inspection of EC2 instances, which can identify software vulnerabilities in application programming packages, including Python, Java, and Node.js packages in addition to operating system packages.&lt;br&gt;
Amazon Inspector integration is supported with tools like Jenkins and &lt;a href="https://www.jetbrains.com/teamcity/"&gt;TeamCity&lt;/a&gt; for container image assessments. This integration allows developers to assess their container images for software vulnerabilities within their &lt;a href="https://dev.to/ci-cd-consulting/"&gt;continuous integration and continuous delivery (CI/CD)&lt;/a&gt; tools. &lt;br&gt;
Inspector V2 allows you to centrally manage the service via multiple AWS accounts. We can follow simple steps to enable Inspector, on the landing page, we have to select assessment setup based on requirements.  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;We can select the kind of assessments we want to perform, it can be either Network or Host. &lt;/li&gt;
&lt;li&gt;It will further ask us to select the assessment target and option to install inspector agents on targets, our primary targets are EC2 instances.&lt;/li&gt;
&lt;li&gt;Select assessment templates, duration of assessment, and schedule.&lt;/li&gt;
&lt;li&gt;Review the configuration and create an assessment.
You can read the docs to &lt;a href="https://docs.aws.amazon.com/inspector/latest/user/what-is-inspector.html"&gt;learn about Inspector&lt;/a&gt; in detail. 
Once the assessment part is completed, we can proceed with the delegation part and auto-enabling AWS Inspector for new member accounts, we can opt for EC2, ECR, AWS Lambda standard, and Lambda code scanning.
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbcqbqu8ybybfp7aijzi5.png" alt="Amazon Inspector" width="800" height="444"&gt;
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcr4a2rz9i19gvzp60845.png" alt="Activate Inspector" width="800" height="220"&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Advance services
&lt;/h2&gt;

&lt;p&gt;These services should be considered as the product matures while focusing on enhancing security and compliance with a better budget in hand. &lt;/p&gt;

&lt;h3&gt;
  
  
  IAM Access Analyzer
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html"&gt;AWS IAM Access Analyzer&lt;/a&gt; helps you identify the resources in your organization and accounts, such as Amazon S3 buckets or IAM roles, that are shared with an external entity. This lets you identify unintended access to your resources and data, which is a security risk.&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwycewhucw9rknk4qg1e8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwycewhucw9rknk4qg1e8.png" alt="IAM Access Analyzer" width="749" height="895"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Detective
&lt;/h3&gt;

&lt;p&gt;Detective makes it easier to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities. It automatically collects log data from your AWS resources and uses &lt;a href="https://dev.to/blogs/introduction-to-mlops/"&gt;machine learning&lt;/a&gt;, statistical analysis, and graph theory to build a linked set of data that enables us to easily conduct faster and more efficient security investigations. &lt;br&gt;
It can analyze events from multiple data sources such as Virtual Private Cloud (VPC) Flow Logs, AWS CloudTrail, and Amazon GuardDuty, and automatically creates a unified, interactive view of our resources, users, and the interactions between them over time.&lt;br&gt;&lt;br&gt;
Detective automatically extracts time-based events such as login attempts, API calls, and network traffic from AWS CloudTrail and VPC Flow Logs. It also ingests findings detected by GuardDuty.  You can check the docs to &lt;a href="https://docs.aws.amazon.com/detective/latest/adminguide/what-is-detective.html"&gt;learn more about Detective&lt;/a&gt;.&lt;br&gt;
Multiple roles can be assigned to AWS Detective.&lt;br&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh9ikmer3mabxnfweivlv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh9ikmer3mabxnfweivlv.png" alt="Detective" width="800" height="358"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Macie
&lt;/h3&gt;

&lt;p&gt;Fully managed data security and data privacy service that uses machine learning and pattern matching to discover and protect your sensitive data in AWS. Macie applies machine learning and pattern-matching techniques to the buckets you select to identify and alert you to sensitive data, such as personally identifiable information (PII). You can view the docs to &lt;a href="https://docs.aws.amazon.com/macie/latest/user/what-is-macie.html"&gt;explore Macie&lt;/a&gt;.&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqh71lvze51ca1x0bwhj7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqh71lvze51ca1x0bwhj7.png" alt="Macie" width="800" height="422"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9zcjjo49c3asl0rekupw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9zcjjo49c3asl0rekupw.png" alt="S3 Buckets" width="800" height="248"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Systems Manager
&lt;/h2&gt;

&lt;p&gt;Using the &lt;a href="https://docs.aws.amazon.com/systems-manager/latest/userguide/what-is-systems-manager.html"&gt;Systems Manager&lt;/a&gt; we can view operational data from multiple AWS services and automate operational tasks across our AWS resources. Systems Manager helps you maintain security and compliance by scanning your managed instances and reporting on (or taking corrective action on) any policy violations it detects. &lt;br&gt;
Important services provided by Systems Manager are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Operations Management

&lt;ul&gt;
&lt;li&gt;Explorer&lt;/li&gt;
&lt;li&gt;OpsCenter&lt;/li&gt;
&lt;li&gt;Incident Manager&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;li&gt;Application Management

&lt;ul&gt;
&lt;li&gt;Application Manager&lt;/li&gt;
&lt;li&gt;AppConfig&lt;/li&gt;
&lt;li&gt;Parameter Store&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;li&gt;Change Management

&lt;ul&gt;
&lt;li&gt;Automation &lt;/li&gt;
&lt;li&gt;Change Manager&lt;/li&gt;
&lt;li&gt;Maintenance Windows&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;li&gt;Node Management

&lt;ul&gt;
&lt;li&gt;Fleet Manager&lt;/li&gt;
&lt;li&gt;Session Manager&lt;/li&gt;
&lt;li&gt;Patch Manager
We can run ad-hoc commands, do one-time patching, or schedule patching with the help of Patch Manager. We can use parameter store to store passwords in an encrypted format.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  S3 Storage Lens
&lt;/h3&gt;

&lt;p&gt;With the help of the organizational &lt;a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/storage_lens_basics_metrics_recommendations.html"&gt;Storage Lens&lt;/a&gt;, we can get a clear picture of all the buckets present in various accounts and regions, which storage class the buckets belong to, and what is the status of data protection on buckets. Data protection can tell us about the encryption status of data in buckets (at rest and in-transit).&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs305op8g8aqve2l5gp9n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs305op8g8aqve2l5gp9n.png" alt="S3 Storage lens" width="800" height="343"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2e32eessibsxhkav438t.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2e32eessibsxhkav438t.png" alt="Snapshot 1" width="800" height="252"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F745jiz3ual34qqovges1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F745jiz3ual34qqovges1.png" alt="Snapshot 2" width="800" height="289"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  CloudFormation StackSets
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/what-is-cfnstacksets.html"&gt;AWS CloudFormation StackSets&lt;/a&gt; extends the capability of stacks by enabling us to create, update, or delete stacks across multiple accounts and AWS Regions with a single operation. Using an administrator account, we define and manage an AWS CloudFormation template and use the template as the basis for provisioning stacks into selected target accounts across specified AWS Regions. It can be beneficial when we have to roll out any tool or policy across the organization. It can also let us know if there are any deviations after the deployment/roll-out.&lt;br&gt;&lt;br&gt;
There are 3 primary stages when we are working with StackSets:    &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Create&lt;/li&gt;
&lt;li&gt;Update &lt;/li&gt;
&lt;li&gt;Delete
&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyei7fpu2mnzbxj9tsl6b.png" alt="CloudFormation StackSets" width="800" height="484"&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  AWS Trusted Advisor
&lt;/h3&gt;

&lt;p&gt;Although a Trusted Advisor is not purely a security service, we can get security recommendations from the service, and we can use it across all accounts under the organization. We can create reports and export those reports in CSV or JSON format.&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvt1a9s89akim67pweo3o.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvt1a9s89akim67pweo3o.png" alt="AWS Trusted Advisor" width="800" height="168"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Firhzp9c2ogaw7bvtgrtm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Firhzp9c2ogaw7bvtgrtm.png" alt="Trusted Advisor dashboard" width="800" height="401"&gt;&lt;/a&gt;(/assets/img/Blog/security-centralization-aws-multi-account-using-native-services/trusted-advisor-dashboard.png)&lt;br&gt;
You can read the docs to &lt;a href="https://docs.aws.amazon.com/whitepapers/latest/cost-optimization-reservation-models/aws-trusted-advisor.html"&gt;learn more about Trusted Advicor&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;If you have a multi-account structure, consider centralization of services using AWS native services to better manage security and compliance. In this blog post, we have covered the native security services by AWS that can help us achieve basic security as well as some level of advanced security. The various tools provided by AWS cover many security aspects like logging, monitoring, alerting, patch management, scanning, etc. &lt;br&gt;
I hope you found this blog post informative and engaging. I’d love to hear your thoughts on this post. Let’s connect and start a conversation on &lt;a href="https://www.linkedin.com/in/nitesh-saini-86280523/"&gt;LinkedIn&lt;/a&gt;. Looking for help with securing your infrastructure or want to outsource DevSecOps to the experts? Learn why so many startups &amp;amp; enterprises consider us as one of the &lt;a href="https://dev.to/devsecops-consulting-services/"&gt;best DevSecOps consulting &amp;amp; services companies&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>A Comprehensive Guide to Achieving SOC 2 Compliance</title>
      <dc:creator>Nitesh Saini</dc:creator>
      <pubDate>Thu, 08 Feb 2024 09:58:11 +0000</pubDate>
      <link>https://forem.com/infracloud/a-comprehensive-guide-to-achieving-soc-2-compliance-151e</link>
      <guid>https://forem.com/infracloud/a-comprehensive-guide-to-achieving-soc-2-compliance-151e</guid>
      <description>&lt;p&gt;Data security and privacy are one of the top priorities for organizations and their clients in the current digital era. Industry standards and regulatory frameworks have been developed to make sure that businesses manage sensitive data appropriately. The SOC (System and Organisation Controls) 2 is one such standard.&lt;br&gt;
Obtaining SOC 2 compliance demonstrates an organization's commitment to data security and privacy, which can enhance trust and confidence among customers and partners. It's particularly relevant for businesses that handle sensitive or private data, such as technology, healthcare, finance, and other sectors. In this blog post, we'll define SOC 2 compliance and walk you through the various phases and processes you can follow to achieve it.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is SOC 2 Compliance?
&lt;/h2&gt;

&lt;p&gt;SOC 2 is a framework developed by the &lt;a href="https://www.aicpa.org/"&gt;AICPA (American Institute of Certified Public Accountants)&lt;/a&gt; to assess the various trust service principles, which are Security, Availability, Processing Integrity, Confidentiality, and Privacy of customer data stored in cloud-based systems and data centers. It provides a set of criteria that organizations must meet to demonstrate their commitment to data security and privacy. Achieving SOC 2 compliance not only reassures customers about the security of their data but also enhances an organization's overall cybersecurity posture.&lt;br&gt;
Organizations that undergo SOC 2 compliance assessments are evaluated based on these principles, and an independent auditor assesses their adherence to the stated criteria. The resulting SOC 2 report assures stakeholders, such as customers, that the organization has established and implemented effective controls to meet these principles.&lt;br&gt;
SOC 2 reports come in two main types: SOC 2 Type 1 and SOC 2 Type 2. These reports provide information about an organization's control environment, specifically regarding the five trust service principles (Security, Availability, Processing Integrity, Confidentiality, and Privacy).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A SOC 2 Type 1 report evaluates an organization's systems and controls at a specific point in time. It provides a snapshot of the controls in place as of a specific date.&lt;br&gt;
A SOC 2 Type 2 report goes beyond a Type 1 report by reviewing the controls over time, often for at least six months. It evaluates if the controls have been successful during this time period and how well they have been doing.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Purpose&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Type 1 reports are often used by organizations or their customers to assess the design and implementation of controls. They help stakeholders understand what controls are in place and how they are intended to work.&lt;br&gt;
Type 2 reports provide a more comprehensive assessment of an organization's control environment. They are often sought by customers and stakeholders who want assurance that the controls are not only designed appropriately but are also functioning effectively over time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Time Period&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Type 1 reports cover controls and their effectiveness at a specific date, typically a single day or moment in time.&lt;br&gt;
Type 2 reports cover controls and their effectiveness over a specified period, typically six to twelve months.&lt;/p&gt;

&lt;h2&gt;
  
  
  How to achieve SOC 2 Compliance?
&lt;/h2&gt;

&lt;p&gt;As we know what SOC 2 compliance is and its importance, let’s see how your organizations can achieve it. The 9 steps of achieving SOC 2 compliance are:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Understand your scope&lt;/li&gt;
&lt;li&gt;Select the right trust service criteria&lt;/li&gt;
&lt;li&gt;Perform a gap assessment&lt;/li&gt;
&lt;li&gt;Develop policies and procedures&lt;/li&gt;
&lt;li&gt;Implement security controls&lt;/li&gt;
&lt;li&gt;Monitor and audit&lt;/li&gt;
&lt;li&gt;Engage a third-party auditor&lt;/li&gt;
&lt;li&gt;Remediate and improve&lt;/li&gt;
&lt;li&gt;Maintain ongoing compliance
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Let’s understand each one in detail.&lt;/p&gt;

&lt;h3&gt;
  
  
  Step 1: Understand your scope
&lt;/h3&gt;

&lt;p&gt;It's crucial to establish the scope of your assessment before starting the route toward SOC 2 compliance. The systems, applications, and data that are pertinent to the services offered by your organization must be identified. The compliance procedure will be easier to handle if the scope is reduced. The scope is generally called system description, and it is divided into various description criteria (DC). Below are the various description criteria that we have to include in our system description document as per &lt;a href="https://www.aicpa-cima.com/resources/download/get-description-criteria-for-your-organizations-soc-2-r-report"&gt;AICPA official documentation&lt;/a&gt;: &lt;br&gt;
&lt;strong&gt;DC1&lt;/strong&gt;: The types of services provided by the organization (SAAS, PAAS, etc.).&lt;br&gt;
&lt;strong&gt;DC2&lt;/strong&gt;: The principal service commitments and system requirements.&lt;br&gt;
&lt;strong&gt;DC3&lt;/strong&gt;: The components of the system used to provide the services, including the following:&lt;br&gt;
    a. Infrastructure&lt;br&gt;
    b. Software&lt;br&gt;
    c. People&lt;br&gt;
    d. Procedures&lt;br&gt;
    e. Data&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;DC4&lt;/strong&gt;: For identified system incidents that (a) were the result of controls that were not suitably designed or operating effectively or (b) otherwise resulted in a significant failure in the achievement of one or more of those service commitments and system requirements, as of the date of the description (for a type 1) or during the period of time covered by the description (for a type 2), as applicable, the following information:&lt;br&gt;
    a. Nature of each incident&lt;br&gt;
    b. Timing surrounding the incident&lt;br&gt;
    c. Extent (or effect) of the incident and its disposition&lt;br&gt;&lt;br&gt;
&lt;strong&gt;DC5&lt;/strong&gt;: The applicable trust services criteria and the related controls designed to provide reasonable assurance that the service organization’s service commitments and system requirements were achieved.&lt;br&gt;
&lt;strong&gt;DC6&lt;/strong&gt;: If service organization management assumed, in the design of the service organization’s system, that certain controls would be implemented by user entities, and those controls are necessary, in combination with controls at the service organization, to provide reasonable assurance that the service organization’s service commitments and system requirements would be achieved, those complementary user entity controls (CUECs).&lt;br&gt;
&lt;strong&gt;DC7&lt;/strong&gt;: If the service organization uses a sub-service organization and the controls at the sub-service organization are necessary, in combination with controls at the service organization, to provide reasonable assurance that the service organization’s service commitments and system requirements are achieved. &lt;br&gt;
&lt;strong&gt;DC8&lt;/strong&gt;: Any specific criterion of the applicable trust services criteria that is not relevant to the system and the reasons it is not relevant.&lt;br&gt;
&lt;strong&gt;DC9&lt;/strong&gt;: In a description that covers a period of time (Type 2 examination), the relevant details of significant changes to the service organization’s system and controls during that period that are relevant to the service organization’s service commitments and system requirements.&lt;/p&gt;

&lt;h3&gt;
  
  
  Step 2: Select the right Trust Services criteria
&lt;/h3&gt;

&lt;p&gt;The five trust service characteristics that underpin SOC 2 compliance are security, availability, processing integrity, confidentiality, and privacy. You need to select the standards that align with your company's goals and offerings. Most organizations begin with the security criterion and add more as necessary.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Security&lt;/strong&gt;: The system is protected against unauthorized access, use, or disclosure to meet the entity's commitments and system requirements. Primary controls under security that we have to take care of are:&lt;br&gt;
a. Security policies: These are written documents that outline an organization's procedures for handling sensitive data, managing it, protecting it, responding to incidents, and complying with legal and regulatory obligations.&lt;br&gt;
b. Security awareness and communication: It is training employees about potential threats like phishing, malware, and social engineering.  Effective communication can help employees understand the threats better.  &lt;/p&gt;

&lt;p&gt;c. Risk assessment &amp;amp; threat identification: Analyze, identify, evaluate, prioritize, and mitigate potential hazards that could cause harm or loss.    &lt;/p&gt;

&lt;p&gt;d. Data classification and encryption of data: It involves classifying information according to its level of sensitivity and utilizing algorithms to convert it into a secure format that ensures privacy, compliance, and protection from breaches.  &lt;/p&gt;

&lt;p&gt;e. Access management (physical and logical): It involves the creation, maintenance, and monitoring of user identities, access permissions, and security policies to ensure data and resources are protected from unauthorized access.   &lt;/p&gt;

&lt;p&gt;f. Data backup and recovery: It involves copying and archiving data to prevent loss in case of corruption/hardware failure/ransomware attacks and performing data integrity by restoration.  &lt;/p&gt;

&lt;p&gt;g. Security monitoring and alerting: It involves continuously scanning systems for suspicious activities, vulnerabilities, and threats.  &lt;/p&gt;

&lt;p&gt;h. Patch management: It is the process of identifying, acquiring, installing, and verifying updates for software and systems. These patches address security vulnerabilities, fix bugs, and add features, ensuring systems remain secure and efficient.  &lt;/p&gt;

&lt;p&gt;i. Incident management: It involves identifying, analyzing, resolving, and documenting incidents to restore service as quickly as possible while minimizing impact on business operations.  &lt;/p&gt;

&lt;p&gt;j. Change management: Change management involves systematically implementing new methods, processes, or technologies within an organization.  &lt;/p&gt;

&lt;p&gt;k. System development: It is the process of creating and maintaining information systems, involving stages like planning, analysis, design, implementation, and testing.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Availability&lt;/strong&gt;: The system is available for operation and use to meet the entity's commitments and system requirements. Primary controls under availability that we have to take care of for SOC 2 are:&lt;br&gt;
a. Disaster recovery (DR) and business continuity policy and planning (BCP): Resilience through proactive planning, backup systems, and protocols to maintain operations during and after unexpected disruptions.   &lt;/p&gt;

&lt;p&gt;b. Data Backup restoration and validation process:  Retrieve data from backup storage and verify the restored data's integrity, completeness, and usability.   &lt;/p&gt;

&lt;p&gt;c. Monitoring and incident response: Continuous surveillance of systems to detect and address security breaches or policy violations quickly, minimizing damage and downtime.   &lt;/p&gt;

&lt;p&gt;d. Redundant infrastructure, fault tolerance, and load balancing: Design the application in such a way it handles failures seamlessly, and load balancing distributes workloads to ensure system reliability and efficiency.  &lt;/p&gt;

&lt;p&gt;e. Network security and DDOS mitigation: Protect networks using firewalls, encryption, and intrusion detection systems. Mitigate DDoS through traffic analysis, filtering, and distributed defense strategies.   &lt;/p&gt;

&lt;p&gt;f. Availability monitoring and reporting: Continuous tracking of system uptime and performance.&lt;/p&gt;

&lt;p&gt;g. Capacity planning and scalability: Planning the resources keeping in mind the growth, planned and unplanned events to keep service up and running.  &lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Processing integrity&lt;/strong&gt;: System processing is complete, accurate, timely, and authorized to meet the entity's commitments and system requirements. Primary controls under process integrity  are:&lt;/p&gt;

&lt;p&gt;a. Data validation and verification: Ensuring the integrity and completeness of data being processed.  &lt;/p&gt;

&lt;p&gt;b. Transaction logging and monitoring: Recording and tracking database transactions to ensure data integrity, security, and compliance with regulatory and operational standards.   &lt;/p&gt;

&lt;p&gt;c. Automated processing controls: Ensuring accuracy, efficiency, and consistency in data handling through algorithms and processes.  &lt;/p&gt;

&lt;p&gt;d. Real-time monitoring for critical processes, data, and configuration: Processes to promptly identify and address any deviations or anomalies that may impact processing integrity.  &lt;/p&gt;

&lt;p&gt;e. Automated processing controls: Utilize automated controls to validate and ensure that automated processing functions as intended.  &lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Confidentiality&lt;/strong&gt;: Information designated as confidential is protected to meet the entity's commitments and system requirements. Primary controls under confidentiality are:&lt;br&gt;
a. Data encryption: Using encryption mechanisms to protect data at rest and in transit.  &lt;/p&gt;

&lt;p&gt;b. Access control: Implement strict access control measures to ensure that only authorized individuals have access to sensitive systems and data.  &lt;/p&gt;

&lt;p&gt;c. Authentication and authorization: Require strong and unique passwords for all user accounts and user access rights based on changes in roles or responsibilities.  &lt;/p&gt;

&lt;p&gt;d. Audit trails: Maintain detailed logs and audit trails of all activities related to sensitive data and systems.  &lt;/p&gt;

&lt;p&gt;e. Data classification and handling: Classify data based on its sensitivity level (e.g., public, internal, confidential) and apply appropriate security controls accordingly.  &lt;/p&gt;

&lt;p&gt;f. Secure data transfer: Use secure protocols and mechanisms for transferring sensitive data, such as Secure FTP (SFTP), HTTPS, or encrypted email.  &lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Privacy&lt;/strong&gt;: Personal information is collected, used, retained, disclosed, and destroyed in conformity with the commitments in the entity's privacy notice and with criteria set forth in generally accepted privacy principles issued by the AICPA and CICA (Canadian Institute of Chartered Accountants). Primary controls under privacy are:&lt;br&gt;&lt;br&gt;
a. Choice and consent control: Obtaining explicit consent from individuals for collecting and processing their data.  &lt;/p&gt;

&lt;p&gt;b. Collection limitation: Limit the collection of personal data to what is necessary for the stated purposes and obtain data lawfully.  &lt;/p&gt;

&lt;p&gt;c. Access, use, and disclosure: Restrict access to personal data to authorized personnel and disclose or share it only as specified in the privacy policy or with explicit consent.  &lt;/p&gt;

&lt;p&gt;d. Retention, disposal, and sharing of data: Use personal data only for specified purposes, retain it for a reasonable duration, and securely dispose of it when no longer needed.  &lt;/p&gt;

&lt;p&gt;e. Accuracy and completeness: Take measures to ensure that personal data is accurate, complete, and up to date.  &lt;/p&gt;

&lt;p&gt;f. Notice and communication of objectives: Communicate privacy policies and objectives to individuals whose data is being collected. &lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Step 3: Perform a gap assessment
&lt;/h3&gt;

&lt;p&gt;Performing a gap assessment is the first step after finalizing the scope and identifying the trust service criteria that are suitable for your organization. A gap assessment can help us identify the current gaps and loopholes in our system, whether related to infrastructure, application, or any process we are following, and highlight the potential blockers in the SOC2 journey.&lt;br&gt;
Once the gaps are identified as per the service criteria selected, we have to work towards filling those gaps by creating the process, modifying the existing process, implementing some policies, etc.  This assessment will help us prioritize security measures and controls. You can consider engaging a third-party auditor to ensure objectivity and accuracy. There are tools present in the market, like &lt;a href="https://drata.com/"&gt;Drata&lt;/a&gt;, &lt;a href="https://secureframe.com/"&gt;SecureFrame&lt;/a&gt;, &lt;a href="https://www.vanta.com/"&gt;Vanta&lt;/a&gt;, and &lt;a href="https://www.jupiterone.com/"&gt;JupiterOne&lt;/a&gt;, that can help ease the process of doing a continuous compliance check and make us aware of gaps. However, all the checks and controls can’t be automated and need manual intervention. &lt;br&gt;
Some of the common topics that are covered under gap assessment are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Inventory of software and hardware&lt;/li&gt;
&lt;li&gt;End-user device security (authentication, password, patch management, etc.)&lt;/li&gt;
&lt;li&gt;Security alerting and monitoring&lt;/li&gt;
&lt;li&gt;Backup and recovery validation &lt;/li&gt;
&lt;li&gt;Data protection at rest and in-transit &lt;/li&gt;
&lt;li&gt;Access control mechanism&lt;/li&gt;
&lt;li&gt;Change management &lt;/li&gt;
&lt;li&gt;Incident management &lt;/li&gt;
&lt;li&gt;Information security awareness&lt;/li&gt;
&lt;li&gt;Security policies and standards&lt;/li&gt;
&lt;li&gt;Threat intelligence &lt;/li&gt;
&lt;li&gt;Risk management&lt;/li&gt;
&lt;li&gt;Disaster recovery and business continuity &lt;/li&gt;
&lt;li&gt;Onboarding and offboarding processes&lt;/li&gt;
&lt;li&gt;Secure coding practices and pen-testing &lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Step 4: Develop policies and procedures
&lt;/h3&gt;

&lt;p&gt;After defining the scope and choosing the trust service criteria, we must develop robust policies and procedures that align with the selected trust service criteria. These should outline the security measures and controls you'll implement to address the identified risks. Ensure employees are trained on these policies and aware of their responsibilities. Some of the most common policies that we should be working on when planning for SOC 2 are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Acceptable use policy (AUP)&lt;/li&gt;
&lt;li&gt;Information security policy &lt;/li&gt;
&lt;li&gt;Access control policy&lt;/li&gt;
&lt;li&gt;Data management policy&lt;/li&gt;
&lt;li&gt;Human resource security policy&lt;/li&gt;
&lt;li&gt;Physical security policy&lt;/li&gt;
&lt;li&gt;Risk management policy&lt;/li&gt;
&lt;li&gt;Disaster recovery (DR) and business continuity plan (BCP)&lt;/li&gt;
&lt;li&gt;Incident response plan &lt;/li&gt;
&lt;li&gt;Secure development plan &lt;/li&gt;
&lt;li&gt;Cryptography policy&lt;/li&gt;
&lt;li&gt;Third-party management policy&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Step 5: Implement security controls
&lt;/h3&gt;

&lt;p&gt;You need to put in place the necessary security controls to protect customer data and ensure the security of your systems. There are many ways to implement measures like access controls, encryption, intrusion detection systems, and continuous monitoring.  We must collaborate with numerous teams and departments to apply these controls, including HR, DevOps, IT, the product development team, and many more, depending on the trust service criteria we have selected. The primary control categories are mentioned below, the control categories are based on &lt;a href="https://reciprocity.com/what-are-the-coso-control-objectives/"&gt;COSO principles&lt;/a&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Control environment&lt;/li&gt;
&lt;li&gt;Communication and information&lt;/li&gt;
&lt;li&gt;Risk assessment&lt;/li&gt;
&lt;li&gt;Monitoring activities&lt;/li&gt;
&lt;li&gt;Control activities&lt;/li&gt;
&lt;li&gt;Logical and physical access control&lt;/li&gt;
&lt;li&gt;System operations&lt;/li&gt;
&lt;li&gt;Change management&lt;/li&gt;
&lt;li&gt;Risk mitigation &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The majority of these depend on processes, therefore if a process is established, such as the onboarding and offboarding processes, backup validation processes, change management processes, patch management, etc. we need to ensure that it is being followed. Regular internal audits for verification of controls and process can be very helpful as they can help us identify any kind of drift from standards and processes.&lt;/p&gt;

&lt;h3&gt;
  
  
  Step 6: Monitor and audit
&lt;/h3&gt;

&lt;p&gt;Once all the security controls are implemented, we need to make sure that all the security and compliance-related processes and standards are being followed, and we have to perform regular audits to ensure they are functioning effectively. Continuous monitoring is crucial to identify and address any security incidents promptly.&lt;br&gt;
As mentioned above, some tools can help to some extent, but we have to be vigilant, keep a close eye on alerts, incidents, and events, and correlate them to make them more meaningful. &lt;/p&gt;

&lt;h3&gt;
  
  
  Step 7: Engage a third-party auditor
&lt;/h3&gt;

&lt;p&gt;To achieve SOC 2 compliance, we will need to engage a certified third-party auditor. They will assess the controls and processes to determine whether they meet the selected Trust Services Criteria. An audit may take several weeks, during which time we will need to supply the auditor with substantial documentation and proof to back up the statements we have made in our policies.&lt;br&gt;
After receiving all of the evidence, the auditor will check it and may request more information. The auditor will provide you with a detailed report along with the letter of attestation, which can be shared with customers and stakeholders on demand. The report creation usually takes a few weeks, and the report is valid for a period of one year. The report contains all the controls against which the auditor has validated your systems and their findings and scope of improvement, if any.&lt;/p&gt;

&lt;h3&gt;
  
  
  Step 8: Remediate and improve
&lt;/h3&gt;

&lt;p&gt;If the auditor identifies any deficiencies, take prompt action to remediate them. Use the audit findings as an opportunity to continually enhance your security and compliance measures. Achieving security is a continuous process and we have to keep on adapting changes and implementing processes, policies, and standards to stay compliant.&lt;/p&gt;

&lt;h3&gt;
  
  
  Step 9: Maintain ongoing compliance
&lt;/h3&gt;

&lt;p&gt;Achieving SOC 2 compliance is not a one-time effort. You must maintain ongoing compliance by regularly reviewing and updating your policies, conducting risk and gap assessments, and monitoring your systems. We can schedule calendar invites between multiple teams to perform an internal audit to ensure process setups are followed and there is no drift. Regular audits can help us identify the gaps in the early stage. Engaging in periodic SOC 2 audits demonstrates your commitment to data security.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;SOC 2 compliance is a rigorous but essential standard for organizations that handle customer data. By following these steps and dedicating resources to data security and privacy, you can achieve SOC 2 compliance, build customer trust, and enhance your overall cybersecurity posture. Remember that compliance is an ongoing process, and continuous improvement is key to staying ahead of emerging threats and vulnerabilities.&lt;br&gt;
Thank you for reading this blog post, and hope it was informative and engaging. I would love to hear your thoughts on this post, so start a conversation on &lt;a href="https://www.linkedin.com/in/nitesh-saini-86280523/"&gt;LinkedIn&lt;/a&gt;. &lt;br&gt;
Looking for help with securing your infrastructure or want to outsource DevSecOps to the experts? Learn why so many startups &amp;amp; enterprises consider us as one of the &lt;a href="https://dev.to/devsecops-consulting-services/"&gt;best DevSecOps consulting &amp;amp; services companies&lt;/a&gt;.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
