B.1 — Framework Coverage Summary
The following compliance frameworks were evaluated during this assessment across all four cloud providers.
CIS Benchmarks
AWS v3.0
Azure v2.1
Kubernetes v1.8
NIST 800-53
Revision 5
Security & Privacy
Controls Catalog
PCI DSS
Version 4.0
Payment Card
Industry Standard
HIPAA
Security Rule
Technical & Admin
Safeguards
SOC 2 Type II
Trust Services
Criteria (TSC)
5 Domains
GDPR
EU General Data
Protection
Regulation
B.2 — Cross-Framework Control Mapping
7 Security DomainsThe table below maps security domains assessed in this report to their corresponding control families and requirement IDs across each compliance framework. This mapping enables organizations to understand how remediating a single finding can satisfy requirements across multiple frameworks simultaneously.
| Security Domain | CIS Benchmark | NIST 800-53 R5 | PCI DSS v4.0 | HIPAA | SOC 2 TSC |
|---|---|---|---|---|---|
|
Identity & Access Management
MFA, RBAC, root keys, least privilege
|
1.1–1.222.1.1–2.1.4
|
AC-2 AC-3AC-6 IA-2IA-5 IA-8
|
7.1 7.27.3 8.18.2 8.38.4 8.5
|
§164.312(a)§164.312(d)§164.308(a)(3)§164.308(a)(4)
|
CC6.1CC6.2CC6.3
|
|
Data Protection
Encryption at rest/transit, key management
|
2.1–2.43.1–3.8
|
SC-8 SC-12SC-13 SC-28MP-5
|
3.4 3.53.6 3.74.1 4.2
|
§164.312(a)(2)(iv)§164.312(e)(1)§164.312(e)(2)(ii)
|
CC6.1CC6.7C1.1
|
|
Network Security
VPC, security groups, network policies
|
4.1–4.55.1–5.4
|
SC-7 SC-8AC-4 CA-3SC-22
|
1.2 1.31.4 1.52.2.1
|
§164.312(e)(1)§164.308(a)(4)
|
CC6.1CC6.6CC6.7
|
|
Logging & Monitoring
CloudTrail, flow logs, audit logs, SIEM
|
3.1–3.144.1–4.16
|
AU-2 AU-3AU-6 AU-8AU-12 SI-4
|
10.1 10.210.3 10.410.5 10.610.7
|
§164.312(b)§164.308(a)(1)(ii)(D)§164.308(a)(5)(ii)(C)
|
CC7.1CC7.2CC7.3
|
|
Incident Response
Alerting, response plans, forensic readiness
|
4.15–4.16
|
IR-1 IR-2IR-4 IR-5IR-6 IR-8
|
12.1012.10.1–12.10.7
|
§164.308(a)(6)§164.308(a)(6)(ii)
|
CC7.3CC7.4CC7.5
|
|
Configuration Management
Hardening, baseline configs, IaC, drift
|
2.1–2.35.1–5.6
|
CM-2 CM-6CM-7 CM-8SA-22
|
2.1 2.26.3 6.4
|
§164.310(a)(2)(iv)§164.312(a)(2)(i)
|
CC6.1CC8.1
|
|
Vulnerability Management
Scanning, patching, dependency management
|
5.3–5.4
|
RA-5 SI-2SI-5 SA-11
|
6.1 6.26.3 11.3
|
§164.308(a)(1)(ii)(A)§164.308(a)(8)
|
CC7.1CC3.2
|
B.3 — Compliance Gap Analysis
Gaps IdentifiedThe following summary shows the pass/fail percentage for each compliance framework based on the findings in this assessment. Gaps represent checks that failed, indicating non-compliance with the corresponding framework requirements. Note that a single remediation action can resolve gaps across multiple frameworks simultaneously.
| Compliance Framework | Total Requirements | Passed | Failed | Manual Review | Pass Rate |
|---|---|---|---|---|---|
|
CIS AWS Foundations v3.0
Amazon Web Services
|
67 | 41 | 22 | 4 | |
|
CIS Azure Foundations v2.1
Microsoft Azure
|
82 | 29 | 47 | 6 | |
|
CIS Kubernetes v1.8
AKS Cluster
|
124 | 109 | 12 | 3 | |
|
NIST 800-53 Rev 5
Federal Security Standard
|
256 | 178 | 64 | 14 | |
|
PCI DSS v4.0
Payment Card Industry
|
64 | 38 | 21 | 5 | |
|
HIPAA Security Rule
Healthcare Compliance
|
45 | 28 | 14 | 3 | |
|
SOC 2 Type II
Trust Services Criteria
|
38 | 27 | 9 | 2 | |
|
GDPR
EU Data Protection
|
28 | 19 | 6 | 3 |