Compliance Framework Guides
Framework-specific guidance for teams that need practical cloud controls and evidence operations, not checklist theater.
HITRUST
Control-to-evidence mapping approach for cloud teams preparing for HITRUST-oriented audit workflows.
Open HITRUST guideHDS
Architecture and evidence strategy for HDS-aligned healthcare cloud environments and control operations.
Open HDS guidePCI DSS
Control and evidence execution guidance for cardholder-data environments in cloud infrastructure.
Open PCI DSS guideHIPAA
Operational cloud security model for ePHI controls, monitoring, and audit evidence readiness.
Open HIPAA guideFedRAMP
Continuous monitoring and control-evidence strategy for teams working in FedRAMP contexts.
Open FedRAMP guideSOC 2
Control and evidence guidance for security and availability outcomes in cloud-native teams.
Open SOC 2 guideNIST CSF
Practical cloud mapping for Identify, Protect, Detect, Respond, and Recover functions.
Open NIST CSF guideISO 27001
Cloud implementation patterns for ISMS-aligned control ownership and evidence management.
Open ISO 27001 guideFramework Comparison Snapshot
Use this as an implementation lens for control ownership, evidence cadence, and likely operational friction.
| Framework | Primary focus | Typical cloud control pressure | Evidence cadence | Common failure mode |
|---|---|---|---|---|
| HITRUST | Comprehensive healthcare/security assurance | Identity governance, baseline hardening, continuous monitoring | Monthly + quarterly recertification | Tool-first strategy without control evidence mapping |
| HDS | Healthcare hosting and protection obligations | Data flow boundaries, residency, traceability, access controls | Monthly evidence + pre-audit sampling | Architecture and legal boundary gaps |
| PCI DSS | Cardholder data environment protection | Segmentation, IAM rigor, vulnerability SLAs, logging | Monthly scans + change-based artifacts | Poor CDE scope definition and drift control |
| HIPAA | ePHI confidentiality, integrity, availability | Access reviews, encryption, backup/restore, audit logging | Monthly + quarterly operational review | Weak ownership for evidence retention |
| FedRAMP | Federal cloud security authorization | Baseline enforcement, POA&M workflow, continuous monitoring | Continuous + formal periodic reporting | Inconsistent SSP/control-to-evidence traceability |
Identity Evidence
Policy snapshots, role-review records, and privilege-path findings with owner sign-off metadata.
Configuration Evidence
Baseline scan artifacts, drift deltas, and documented remediation and exception lifecycle records.
Runtime & IR Evidence
Detection events, triage outcomes, incident timelines, and closure quality controls by severity.