SEC01-BP03 Identify and validate control objectives
Based on your compliance requirements and risks identified from your threat model, derive and validate the control objectives and controls that you need to apply to your workload. Ongoing validation of control objectives and controls help you measure the effectiveness of risk mitigation.
Desired outcome: The security control objectives of your business are well-defined and aligned to your compliance requirements. Controls are implemented and enforced through automation and policy and are continually evaluated for their effectiveness in achieving your objectives. Evidence of effectiveness at both a point in time and over a period of time are readily reportable to auditors.
Common anti-patterns:
-
Regulatory requirements, market expectations, and industry standards for assurable security are not well-understood for your business
-
Your cybersecurity frameworks and control objectives are misaligned to the requirements of your business
-
The implementation of controls does not strongly align to your control objectives in a measurable way
-
You do not use automation to report on the effectiveness of your controls
Level of risk exposed if this best practice is not established: High
Implementation guidance
There are many common cybersecurity frameworks that can form the basis for your security control objectives. Consider the regulatory requirements, market expectations, and industry standards for your business to determine which frameworks best supports your needs. Examples include AICPA SOC 2
For the control objectives you identify, understand how AWS services you consume help you to achieve those objectives. Use AWS Artifact
As you define the controls that achieve your objectives, codify enforcement using preventative controls, and automate mitigations using detective controls. Help prevent non-compliant resource configurations and actions across your AWS Organizations using service control policies (SCP). Implement rules in AWS Config
Use APN Partner Bundles
Implementation steps
-
Evaluate common cybersecurity frameworks, and align your control objectives to the ones chosen.
-
Obtain relevant documentation on guidance and responsibilities for your framework using AWS Artifact. Understand which parts of compliance fall on the AWS side of the shared responsibility model and which parts are your responsibility.
-
Use SCPs, resource policies, role trust policies, and other guardrails to prevent non-compliant resource configurations and actions.
-
Evaluate deploying Security Hub standards and AWS Config conformance packs that align to your control objectives.
Resources
Related best practices:
Related documents:
Related tools: