Technical SOP — Cloud Security Program (IAM → Zero Trust)

 

๐Ÿ“˜ Technical SOP — Cloud Security Program (IAM → Zero Trust)

Version: 1.0
Owner: Cloud Security Office
Author: Raju Ambhore — Senior IT Project Manager | Cloud & Security Transformation Leader
Approved By: CISO / Head of Cloud
Effective Date: 2025-11-27
Review Frequency: Annually


1. Purpose

This Standard Operating Procedure (SOP) defines the end-to-end implementation, operational governance, and continuous assurance workflow for establishing an enterprise Cloud Security Program across AWS, Azure, and Google Cloud Platform (GCP).
The SOP ensures that all cloud environments adopt Zero Trust, enforce least privilege access, and implement CSPM/CIEM-driven continuous compliance.




2. Scope

✔ All cloud accounts, subscriptions, projects
✔ AWS, Azure, GCP
✔ Internal employees, contractors, partners, and service accounts
✔ All production, non-production, DR, and sandbox environments
✔ IAM, identity federation, data security, network security, monitoring, DevSecOps, logging


3. Roles & Responsibilities

3.1 Cloud Security Team

  • Define enterprise cloud security baselines

  • Own CSPM, CIEM, Zero Trust policy and controls

  • Review violations and approve remediations

  • Enforce MFA, SSO, identity federation

3.2 Cloud Engineering

  • Implement security controls across environments

  • Ensure infrastructure meets baseline (Terraform/ARM/Cloud Deployment Manager)

  • Support continuous monitoring

3.3 DevOps / App Teams

  • Secure-by-design workload deployment

  • Apply pipeline security (SAST/DAST/SCA)

  • Manage secrets via vaulting

3.4 Identity & Access Management (IAM) Team

  • Centralize authentication and authorization

  • Govern role lifecycle: creation, review, removal

  • Maintain identity federation (Azure AD / Okta)

3.5 Compliance & Audit

  • Conduct periodic evaluations

  • Provide regulatory compliance reporting (ISO, SOC2, GDPR, RBI, HIPAA)


4. Definitions

  • CSPM – Cloud Security Posture Management

  • CIEM – Cloud Infrastructure Entitlement Management

  • ZTA – Zero Trust Architecture

  • MFA – Multi-Factor Authentication

  • SAML/OIDC – Authentication federation standards


5. Procedure


5.1 Identity & Access Management (IAM) – Foundation Layer

5.1.1 Create Central Identity Source

Azure AD / Entra ID designated as the primary identity provider.

5.1.2 Enforce Identity Federation

  • AWS SSO → Azure AD

  • GCP Workforce Identity Federation → Azure AD

  • All console logins → SSO only

5.1.3 Mandatory Authentication Controls

Control

Standard

MFA

Mandatory (all users)

Password

14+ characters, no expiry

Biometrics

Allowed

Conditional Access

Location + Device compliance

Session Timeouts

8 hours



5.1.4 Role-Based Access Control

  • No standing admin privileges

  • Use Just-In-Time (JIT) elevation via PIM

  • Break-glass accounts stored in secure vault


5.2 Zero Trust Implementation

5.2.1 Core Principles

  • Verify explicitly

  • Least privilege always

  • Assume breach

5.2.2 Architecture Controls

✔ Micro-segmentation
✔ Identity-aware proxies
✔ Private service endpoints
✔ Continuous real-time access verification
✔ Network trust removed




5.3 Cloud Security Baseline (AWS/Azure/GCP)

5.3.1 AWS Controls

  • IAM Access Analyzer

  • GuardDuty mandatory

  • CloudTrail enabled across all regions

  • S3 encryption AES-256 & KMS mandatory

  • Root account MFA, no access keys

5.3.2 Azure Controls

  • Defender for Cloud → On

  • Azure Policy → Enforce zero-trust baseline

  • Storage encryption enabled

  • Network Watcher enabled

5.3.3 GCP Controls

  • Security Command Center Premium mandatory

  • Cloud Audit Logs (Admin + Data Access)

  • Organizational policies enforced


5.4 Network Security Controls

5.4.1 Cloud-Native Firewalling

  • AWS Security Groups

  • Azure NSG/ASG

  • GCP VPC Firewall Rules

5.4.2 Zero Trust Network Access

  • No public IP unless approved

  • Private Link, VPC Peering, ExpressRoute/DirectConnect

  • TLS 1.2+ mandatory


5.5 Data Security & Encryption

5.5.1 Encryption Standards

  • Data at rest → Cloud KMS

  • Data in transit → TLS 1.2/1.3

  • Backups encrypted

5.5.2 Data Discovery & Classification

  • Azure Purview / Google DLP / Amazon Macie

  • Tagging: sensitivity=low|medium|high


5.6 Monitoring, Logging & Threat Detection

Mandatory Platforms

Cloud

Tool

AWS

GuardDuty, CloudTrail, Config

Azure

Sentinel, Defender for Cloud

GCP

SCC, Cloud Logging, Forseti

Alerting Rules

  • High-risk IAM events

  • Public exposure of storage

  • Unusual login / impossible travel

  • Privilege escalation attempts


5.7 DevSecOps & CI/CD Security

Pipeline Standards

  • Secure IaC (Terraform, ARM, CloudFormation)

  • IaC scanning: Checkov / tfsec

  • Secrets → KeyVault / AWS Secrets Manager / GCP Secret Manager

  • SAST/DAST/SCA mandatory


5.8 Compliance & Continuous Assurance

5.8.1 CSPM / CIEM

  • Weekly drift detection

  • Auto-remediation where possible

  • Monthly posture report to CISO

5.8.2 Quarterly Controls Review

  • IAM role review

  • Key rotation verification

  • Policy gap analysis


5.9 Incident Response Workflow

Steps

  1. Event detection (SIEM/CSPM)

  2. Triage severity

  3. Contain (Revoke access / isolate resource)

  4. Forensic collection

  5. Root cause analysis

  6. Reporting to leadership

  7. Preventive control implementation





6. Documentation & Evidence

  • Security baseline templates

  • Access review logs

  • CSPM monthly reports

  • Incident reports

  • Change management tickets


7. KPIs & Metrics

KPI

Target

IAM violations

0 critical

Public exposure

0

MFA coverage

100%

CIS Benchmark score

> 90%


8. References

  • NIST 800-207 Zero Trust Architecture

  • CSA Cloud Controls Matrix

  • Gartner IAM & Zero Trust Reports

  • AWS/Azure/GCP Security Benchmarks (CIS)


9. Revision History

Version

Date

Description

Author

1.0

2025-11-27

Initial Release

Raju Ambhore


#CloudSecurity #ZeroTrust #IAM #IdentitySecurity #AccessManagement #CSPM #CIEM #MultiCloudSecurity #SecurityArchitecture #CloudGovernance #DevSecOps #CloudCompliance #RiskManagement #CyberSecurityStrategy #EnterpriseSecurity


SOP :
https://docs.google.com/document/d/e/2PACX-1vTDd7yB7jLp3x7Xj1bOnxdtZRBEidXtB-bWyJR3hggVaogJjxGwS5EaqLcTRH275l4ZlHwljGiA4OmV/pub

✍️Author; Raju Ambhore : Senior IT Project Manager | Cloud & Security Transformation Leader


No comments:

Post a Comment

Bridging Enterprise Blind Spots: Why MITRE ATT&CK® Must Become the Core of Modern Cyber Defense in 2025

W hy MITRE ATT&CK Now Defines the Real State of Enterprise Cyber Defense Cybersecurity leaders today increasingly admit a difficult trut...