Skip to main content

ApplicationSpec Compliance Requirements

This document outlines compliance considerations for CloudForge ApplicationSpecs across various regulatory frameworks.

Compliance Framework Overviewโ€‹

CloudForge supports the following compliance frameworks:

  • SOC 2 - Service Organization Control 2 (Trust Services Criteria)
  • PCI-DSS - Payment Card Industry Data Security Standard
  • HIPAA - Health Insurance Portability and Accountability Act
  • GDPR - General Data Protection Regulation
  • FERPA - Family Educational Rights and Privacy Act

Applications with Compliance Requirementsโ€‹

Databases (HIGH COMPLIANCE RISK)โ€‹

PostgreSQL โš ๏ธ HIGH RISKโ€‹

Compliance Frameworks: ALL (SOC2, PCI-DSS, HIPAA, GDPR, FERPA)

Why: Databases store sensitive data including:

  • Personal Identifiable Information (PII)
  • Protected Health Information (PHI) - HIPAA
  • Payment Card Data - PCI-DSS
  • Customer data - SOC2, GDPR
  • Student records - FERPA

Required Controls:

  • โœ… Encryption at Rest: EFS/EBS encryption (automatic in CloudForge)
  • โœ… Encryption in Transit: SSL/TLS connections required
  • โš ๏ธ Access Control: Strong passwords, no defaults
  • โš ๏ธ Audit Logging: Enable PostgreSQL audit extension (pgAudit)
  • โš ๏ธ Backup/Retention: Automated backups with retention policies
  • โš ๏ธ Data Masking: Required for non-production environments
  • โš ๏ธ Network Isolation: Private subnets only for production

PCI-DSS Specific (Storing cardholder data):

  • Req 3.4: Encryption of cardholder data
  • Req 3.5.1: Restrict access to cryptographic keys
  • Req 8.2: Multi-factor authentication for administrators
  • Req 10.2: Audit trail for all access to cardholder data

HIPAA Specific (Storing PHI):

  • ยง164.312(a)(2)(iv): Encryption and decryption
  • ยง164.312(b): Audit controls
  • ยง164.312(c)(1): Integrity controls
  • ยง164.312(d): Person or entity authentication

Implementation:

// CloudForge automatically handles:
// - EFS encryption at rest โœ“
// - Security groups for network isolation โœ“
// - CloudWatch audit logging โœ“

// User must configure:
// - Strong passwords (use AWS Secrets Manager)
// - SSL/TLS connections
// - Database-level audit logging (pgAudit)

Redis โš ๏ธ HIGH RISKโ€‹

Compliance Frameworks: ALL (when storing sensitive data)

Why: Often used for:

  • Session storage (PII, authentication tokens)
  • Cache for sensitive data
  • Message queues with customer data

Required Controls:

  • โœ… Encryption at Rest: EFS/EBS encryption
  • โœ… Authentication: Password required (default: changeme - MUST change!)
  • โš ๏ธ Encryption in Transit: Enable TLS mode
  • โš ๏ธ Key Expiration: Set TTLs for sensitive data
  • โš ๏ธ Network Isolation: Private subnets only

PCI-DSS Considerations:

  • Session tokens are considered "sensitive authentication data"
  • Redis must NOT store unencrypted cardholder data
  • If used for caching, implement key expiration

HIPAA Considerations:

  • PHI in cache must be encrypted and expire quickly
  • Access logs required for audit trails

Version Control Systems (MEDIUM-HIGH COMPLIANCE RISK)โ€‹

GitLab โš ๏ธ MEDIUM-HIGH RISKโ€‹

Compliance Frameworks: SOC2, GDPR, FERPA (HIPAA/PCI-DSS if storing regulated code)

Why: Source code repositories may contain:

  • Secrets/credentials accidentally committed
  • Personally identifiable information (PII) in code/comments
  • Customer data in test fixtures
  • Proprietary algorithms and business logic

Required Controls:

  • โœ… Encryption at Rest: EFS/EBS encryption
  • โš ๏ธ Access Control: Strong authentication (SSO/MFA recommended)
  • โš ๏ธ Audit Logging: Enable GitLab audit events
  • โš ๏ธ Secret Scanning: Enable secret detection
  • โš ๏ธ Branch Protection: Protect main branches
  • โš ๏ธ Code Review: Required for compliance-sensitive repos

SOC2 CC6.1 (Logical Access):

  • Implement MFA for all users
  • Regular access reviews
  • Disable inactive accounts

GDPR Article 32 (Security of Processing):

  • Data breach notification capability
  • Access logs for user data
  • Right to erasure (delete user accounts/data)

Gitea โš ๏ธ MEDIUM RISKโ€‹

Compliance Frameworks: SOC2, GDPR, FERPA

Similar requirements to GitLab but lighter weight:

  • Encryption at rest โœ“
  • Strong authentication required
  • Enable built-in access logging
  • Regular security updates

CI/CD Systems (MEDIUM COMPLIANCE RISK)โ€‹

Jenkins โš ๏ธ MEDIUM RISKโ€‹

Compliance Frameworks: SOC2, PCI-DSS (if building payment systems), HIPAA (if deploying healthcare apps)

Why: CI/CD systems have access to:

  • Source code repositories
  • Cloud credentials (AWS, GCP, Azure)
  • Deployment secrets
  • Build artifacts
  • Production environments

Required Controls:

  • โœ… Encryption at Rest: EFS/EBS encryption
  • โš ๏ธ Credential Management: Use Credentials Plugin with encryption
  • โš ๏ธ Access Control: Role-based access (Matrix Authorization)
  • โš ๏ธ Audit Logging: Enable Audit Trail plugin
  • โš ๏ธ Build Isolation: Separate agents for prod/non-prod
  • โš ๏ธ Artifact Scanning: Security scanning before deployment

PCI-DSS Req 6.3.2:

  • Secure code review before production
  • Separation of dev/test from production
  • Code change tracking and approval

SOC2 CC8.1 (Change Management):

  • Approval required for production deployments
  • Rollback capability
  • Audit trail of all changes

GitLab CI/CD (included in GitLab)โ€‹

Same compliance requirements as GitLab VCS plus:

  • Runner isolation
  • Secret masking in logs
  • Protected variables for production

Drone โš ๏ธ MEDIUM RISKโ€‹

Compliance Frameworks: SOC2

Similar to Jenkins:

  • Secret management required
  • Build isolation
  • Audit logging

Monitoring Systems (LOW-MEDIUM COMPLIANCE RISK)โ€‹

Grafana โš ๏ธ LOW-MEDIUM RISKโ€‹

Compliance Frameworks: SOC2, HIPAA (if displaying PHI metrics)

Why: Dashboards may display:

  • System metrics with customer identifiers
  • Application logs with PII
  • Security monitoring data

Required Controls:

  • โœ… Encryption at Rest: EFS/EBS encryption
  • โš ๏ธ Access Control: Enable authentication (not anonymous)
  • โš ๏ธ Data Minimization: Don't display PII/PHI in dashboards
  • โš ๏ธ Audit Logging: Track dashboard access

SOC2 A1.2 (Monitoring):

  • Grafana is a monitoring control itself
  • Access to monitoring data must be restricted
  • Alerts for security events

Prometheus โš ๏ธ LOW-MEDIUM RISKโ€‹

Compliance Frameworks: SOC2

Why: Metrics collection for monitoring

Required Controls:

  • โœ… Encryption at Rest: EFS/EBS encryption
  • โš ๏ธ Network Isolation: Not publicly accessible
  • โš ๏ธ Data Retention: Define retention policies
  • โš ๏ธ Label Security: Don't include PII in metric labels

Compliance Matrixโ€‹

ApplicationSOC2PCI-DSSHIPAAGDPRFERPARisk Level
PostgreSQLโœ… YESโœ… YESโœ… YESโœ… YESโœ… YES๐Ÿ”ด HIGH
Redisโœ… YESโœ… YESโœ… YESโœ… YESโœ… YES๐Ÿ”ด HIGH
GitLabโœ… YESโš ๏ธ MAYBEโš ๏ธ MAYBEโœ… YESโœ… YES๐ŸŸก MED-HIGH
Giteaโœ… YESโš ๏ธ MAYBEโš ๏ธ MAYBEโœ… YESโœ… YES๐ŸŸก MEDIUM
Jenkinsโœ… YESโš ๏ธ MAYBEโš ๏ธ MAYBEโš ๏ธ MAYBEโš ๏ธ MAYBE๐ŸŸก MEDIUM
Droneโœ… YESโš ๏ธ MAYBEโš ๏ธ MAYBEโš ๏ธ MAYBEโš ๏ธ MAYBE๐ŸŸก MEDIUM
Grafanaโœ… YESโŒ NOโš ๏ธ MAYBEโš ๏ธ MAYBEโŒ NO๐ŸŸข LOW-MED
Prometheusโœ… YESโŒ NOโš ๏ธ MAYBEโš ๏ธ MAYBEโŒ NO๐ŸŸข LOW-MED

Legend:

  • โœ… YES: Likely to be in scope for this framework
  • โš ๏ธ MAYBE: Depends on use case and data processed
  • โŒ NO: Unlikely to be in scope
  • ๐Ÿ”ด HIGH: Stores sensitive data directly
  • ๐ŸŸก MEDIUM: Access to sensitive data or critical systems
  • ๐ŸŸข LOW: Monitoring/observability tools

CloudForge Security Profile Mappingโ€‹

PRODUCTION Profileโ€‹

Automatically enforces compliance controls:

  • โœ… Encryption at rest (EFS, EBS, S3)
  • โœ… Private subnets with NAT gateways
  • โœ… CloudWatch audit logging (2+ years retention)
  • โœ… GuardDuty intrusion detection
  • โœ… AWS Config compliance monitoring
  • โœ… VPC Flow Logs
  • โœ… WAF protection for web applications
  • โœ… IAM least privilege roles
  • โœ… MFA enforcement (when using Cognito)
  • โœ… OIDC authentication with group-based access control

See Also: OIDC Authentication Guide for detailed authentication configuration including MFA, group-based access control, and logout integration.

Additional User Responsibilitiesโ€‹

All Databases:

  • Change default passwords immediately
  • Use AWS Secrets Manager for credential storage
  • Enable application-level audit logging
  • Configure backup retention policies
  • Implement data classification

Source Control & CI/CD:

  • Enable MFA for all users
  • Implement code review processes
  • Use secret scanning tools
  • Separate prod/non-prod environments
  • Regular security updates

Monitoring Tools:

  • Restrict access with authentication
  • Avoid displaying PII/PHI in dashboards
  • Configure data retention policies

Compliance Validationโ€‹

CloudForge provides built-in compliance validation rules:

// Example: PCI-DSS Rules for databases
if (topology == TopologyType.DATABASE_SERVICE &&
complianceFrameworks.contains("PCI-DSS")) {
// Enforce:
// - Encryption at rest โœ“ (automatic)
// - Private subnets only โœ“ (enforced)
// - Audit logging enabled โœ“ (automatic)
// - Strong password policy โš ๏ธ (user configures)
// - Network isolation โœ“ (security groups)
}

Recommendations by Use Caseโ€‹

Storing Payment Card Data (PCI-DSS)โ€‹

Required Applications: PostgreSQL with strict controls

  • Use PRODUCTION security profile
  • Private subnets only (no public IPs)
  • Enable pgAudit extension
  • Quarterly vulnerability scans
  • Penetration testing annually
  • Consider: AWS RDS with PCI-compliant configuration instead

Storing Protected Health Information (HIPAA)โ€‹

Required Applications: PostgreSQL, possibly Redis

  • Use PRODUCTION security profile
  • Sign AWS Business Associate Agreement (BAA)
  • Enable encryption in transit (SSL/TLS)
  • Implement audit logging (pgAudit)
  • Data backup and disaster recovery plan
  • Consider: AWS RDS/ElastiCache with HIPAA eligibility

General Business Data (SOC2)โ€‹

Most Applications: Normal deployment

  • Use PRODUCTION or STAGING profile
  • Enable CloudWatch logging
  • Implement access controls
  • Regular security updates

Referencesโ€‹


โš ๏ธ IMPORTANT DISCLAIMER: This document provides general guidance only. Compliance requirements vary by organization, jurisdiction, and specific use cases. Consult with your legal and compliance teams for specific requirements. CloudForge provides security controls but cannot guarantee compliance - proper configuration and operational procedures are the user's responsibility.