Skip to content

Chapter 10 — Compliance & Governance

SOC 2 Type II Controls

SOC2_Controls:
Security:
- Access control management
- Incident response procedures
- Vulnerability management
- Data encryption and protection
- Network security monitoring
Availability:
- Business continuity planning
- Disaster recovery testing
- Performance monitoring
- Redundancy and failover testing
- Incident management
Processing_Integrity:
- Data input validation
- Processing accuracy controls
- Output verification
- Error handling procedures
- Audit trail maintenance
Confidentiality:
- Data classification procedures
- Encryption implementation
- Access restriction controls
- Network security controls
- Data lifecycle management
Privacy:
- Personal data inventory
- Consent management
- Data subject rights processes
- Cross-border data transfer controls
- Privacy notice management

ISO 27001 Annex A Controls

DomainKey ControlsImplementation
A.5 Information Security PoliciesPolicy development, review, communicationQuarterly reviews, executive approval
A.6 Organization of ISRoles and responsibilities, segregation of dutiesRACI matrices, approval workflows
A.7 Human Resource SecurityScreening, training, termination processesBackground checks, security awareness
A.8 Asset ManagementAsset inventory, classification, acceptable useCMDB, classification labels
A.9 Access ControlUser access management, authentication, privilege managementIAM policies, MFA, access reviews
A.10 CryptographyKey management, encryption usageKMS, certificate management
A.11 Physical SecurityPhysical access control, environmental securityData center access, equipment protection
A.12 Operations SecurityLogging, monitoring, malware protectionSIEM, antivirus, patch management
A.13 Communications SecurityNetwork security controls, information transferFirewalls, VPN, TLS
A.14 System AcquisitionSecure development, change managementCI/CD security, change control
A.15 Supplier RelationshipsSupplier risk management, agreementsVendor assessments, contracts
A.16 Incident ManagementIncident detection, response, improvementIncident response plan
A.17 Business ContinuityBCM planning, testing, redundancyBCP, DR testing
A.18 ComplianceRegulatory compliance, IP protectionLegal reviews, IP protection

10.2 Automated Compliance Evidence Collection

Section titled “10.2 Automated Compliance Evidence Collection”

Automated Evidence Collection

ComplianceAutomation:
EvidenceCollection:
Tools:
- AWS Config Rules
- Azure Policy
- GCP Security Health Analytics
- Custom compliance checks
Frequency:
- Real-time: Security configurations
- Hourly: Access control reviews
- Daily: Vulnerability assessments
- Weekly: Policy compliance scans
- Monthly: Full compliance reports
EvidenceTypes:
- Configuration snapshots
- Access review logs
- Vulnerability scan results
- Change management records
- Incident response documentation

Compliance as Code

CompliancePolicies:
SOC2_Security:
- aws_config_rule: "s3-bucket-public-write-prohibited"
description: "S3 buckets must not allow public write access"
- aws_config_rule: "iam-user-no-policies-check"
description: "IAM users should not have inline policies"
- aws_config_rule: "cloudtrail-enabled"
description: "CloudTrail must be enabled in all regions"
ISO27001_AccessControl:
- azure_policy: "audit-vm-manageddisk-encryption"
description: "VM managed disks must be encrypted"
- azure_policy: "audit-storage-account-encryption"
description: "Storage accounts must have encryption enabled"
PCI_DSS:
- gcp_policy: "require-shielded-vm"
description: "Compute instances must use shielded VM features"
- gcp_policy: "enforce-public-ip-disabled"
description: "VMs should not have public IP addresses"

Security Committee Charter

SecurityGovernance:
ExecutiveSteeringCommittee:
Members:
- CISO (Chair)
- CTO
- CFO
- Chief Risk Officer
- Legal Counsel
Meetings: "Quarterly"
Responsibilities:
- Risk appetite approval
- Security budget approval
- Major incident oversight
- Regulatory compliance oversight
SecurityOperationsCommittee:
Members:
- Security Operations Manager
- Infrastructure Lead
- Application Security Lead
- Compliance Officer
- IT Audit Representative
Meetings: "Monthly"
Responsibilities:
- Security metrics review
- Incident response coordination
- Security tooling evaluation
- Policy development
TechnicalWorkingGroup:
Members:
- Security Engineers
- DevOps Engineers
- Cloud Architects
- Application Developers
Meetings: "Bi-weekly"
Responsibilities:
- Security implementation
- Tool configuration
- Best practice development
- Security automation

Risk Assessment Methodology

RiskAssessment:
Scoring:
Likelihood:
Very_Likely: 4-5
Likely: 3-4
Possible: 2-3
Unlikely: 1-2
Very_Unlikely: 0-1
Impact:
Critical: 4-5
High: 3-4
Medium: 2-3
Low: 1-2
Minimal: 0-1
RiskCalculation: "Likelihood × Impact"
RiskLevels:
Critical: 16-25 (Immediate action required)
High: 9-15 (Action within 30 days)
Medium: 4-8 (Action within 90 days)
Low: 1-3 (Monitor and accept)
TreatmentOptions:
Avoid: "Eliminate the risk"
Mitigate: "Implement controls to reduce risk"
Transfer: "Insurance or outsourcing"
Accept: "Risk within appetite"