ApplicationSpec Compliance Requirements
This document outlines compliance considerations for CloudForge ApplicationSpecs across various regulatory frameworks.
Compliance Framework Overviewโ
CloudForge supports the following compliance frameworks:
- SOC 2 - Service Organization Control 2 (Trust Services Criteria)
- PCI-DSS - Payment Card Industry Data Security Standard
- HIPAA - Health Insurance Portability and Accountability Act
- GDPR - General Data Protection Regulation
- FERPA - Family Educational Rights and Privacy Act
Applications with Compliance Requirementsโ
Databases (HIGH COMPLIANCE RISK)โ
PostgreSQL โ ๏ธ HIGH RISKโ
Compliance Frameworks: ALL (SOC2, PCI-DSS, HIPAA, GDPR, FERPA)
Why: Databases store sensitive data including:
- Personal Identifiable Information (PII)
- Protected Health Information (PHI) - HIPAA
- Payment Card Data - PCI-DSS
- Customer data - SOC2, GDPR
- Student records - FERPA
Required Controls:
- โ Encryption at Rest: EFS/EBS encryption (automatic in CloudForge)
- โ Encryption in Transit: SSL/TLS connections required
- โ ๏ธ Access Control: Strong passwords, no defaults
- โ ๏ธ Audit Logging: Enable PostgreSQL audit extension (pgAudit)
- โ ๏ธ Backup/Retention: Automated backups with retention policies
- โ ๏ธ Data Masking: Required for non-production environments
- โ ๏ธ Network Isolation: Private subnets only for production
PCI-DSS Specific (Storing cardholder data):
- Req 3.4: Encryption of cardholder data
- Req 3.5.1: Restrict access to cryptographic keys
- Req 8.2: Multi-factor authentication for administrators
- Req 10.2: Audit trail for all access to cardholder data
HIPAA Specific (Storing PHI):
- ยง164.312(a)(2)(iv): Encryption and decryption
- ยง164.312(b): Audit controls
- ยง164.312(c)(1): Integrity controls
- ยง164.312(d): Person or entity authentication
Implementation:
// CloudForge automatically handles:
// - EFS encryption at rest โ
// - Security groups for network isolation โ
// - CloudWatch audit logging โ
// User must configure:
// - Strong passwords (use AWS Secrets Manager)
// - SSL/TLS connections
// - Database-level audit logging (pgAudit)
Redis โ ๏ธ HIGH RISKโ
Compliance Frameworks: ALL (when storing sensitive data)
Why: Often used for:
- Session storage (PII, authentication tokens)
- Cache for sensitive data
- Message queues with customer data
Required Controls:
- โ Encryption at Rest: EFS/EBS encryption
- โ Authentication: Password required (default: changeme - MUST change!)
- โ ๏ธ Encryption in Transit: Enable TLS mode
- โ ๏ธ Key Expiration: Set TTLs for sensitive data
- โ ๏ธ Network Isolation: Private subnets only
PCI-DSS Considerations:
- Session tokens are considered "sensitive authentication data"
- Redis must NOT store unencrypted cardholder data
- If used for caching, implement key expiration
HIPAA Considerations:
- PHI in cache must be encrypted and expire quickly
- Access logs required for audit trails
Version Control Systems (MEDIUM-HIGH COMPLIANCE RISK)โ
GitLab โ ๏ธ MEDIUM-HIGH RISKโ
Compliance Frameworks: SOC2, GDPR, FERPA (HIPAA/PCI-DSS if storing regulated code)
Why: Source code repositories may contain:
- Secrets/credentials accidentally committed
- Personally identifiable information (PII) in code/comments
- Customer data in test fixtures
- Proprietary algorithms and business logic
Required Controls:
- โ Encryption at Rest: EFS/EBS encryption
- โ ๏ธ Access Control: Strong authentication (SSO/MFA recommended)
- โ ๏ธ Audit Logging: Enable GitLab audit events
- โ ๏ธ Secret Scanning: Enable secret detection
- โ ๏ธ Branch Protection: Protect main branches
- โ ๏ธ Code Review: Required for compliance-sensitive repos
SOC2 CC6.1 (Logical Access):
- Implement MFA for all users
- Regular access reviews
- Disable inactive accounts
GDPR Article 32 (Security of Processing):
- Data breach notification capability
- Access logs for user data
- Right to erasure (delete user accounts/data)
Gitea โ ๏ธ MEDIUM RISKโ
Compliance Frameworks: SOC2, GDPR, FERPA
Similar requirements to GitLab but lighter weight:
- Encryption at rest โ
- Strong authentication required
- Enable built-in access logging
- Regular security updates
CI/CD Systems (MEDIUM COMPLIANCE RISK)โ
Jenkins โ ๏ธ MEDIUM RISKโ
Compliance Frameworks: SOC2, PCI-DSS (if building payment systems), HIPAA (if deploying healthcare apps)
Why: CI/CD systems have access to:
- Source code repositories
- Cloud credentials (AWS, GCP, Azure)
- Deployment secrets
- Build artifacts
- Production environments
Required Controls:
- โ Encryption at Rest: EFS/EBS encryption
- โ ๏ธ Credential Management: Use Credentials Plugin with encryption
- โ ๏ธ Access Control: Role-based access (Matrix Authorization)
- โ ๏ธ Audit Logging: Enable Audit Trail plugin
- โ ๏ธ Build Isolation: Separate agents for prod/non-prod
- โ ๏ธ Artifact Scanning: Security scanning before deployment
PCI-DSS Req 6.3.2:
- Secure code review before production
- Separation of dev/test from production
- Code change tracking and approval
SOC2 CC8.1 (Change Management):
- Approval required for production deployments
- Rollback capability
- Audit trail of all changes
GitLab CI/CD (included in GitLab)โ
Same compliance requirements as GitLab VCS plus:
- Runner isolation
- Secret masking in logs
- Protected variables for production
Drone โ ๏ธ MEDIUM RISKโ
Compliance Frameworks: SOC2
Similar to Jenkins:
- Secret management required
- Build isolation
- Audit logging
Monitoring Systems (LOW-MEDIUM COMPLIANCE RISK)โ
Grafana โ ๏ธ LOW-MEDIUM RISKโ
Compliance Frameworks: SOC2, HIPAA (if displaying PHI metrics)
Why: Dashboards may display:
- System metrics with customer identifiers
- Application logs with PII
- Security monitoring data
Required Controls:
- โ Encryption at Rest: EFS/EBS encryption
- โ ๏ธ Access Control: Enable authentication (not anonymous)
- โ ๏ธ Data Minimization: Don't display PII/PHI in dashboards
- โ ๏ธ Audit Logging: Track dashboard access
SOC2 A1.2 (Monitoring):
- Grafana is a monitoring control itself
- Access to monitoring data must be restricted
- Alerts for security events
Prometheus โ ๏ธ LOW-MEDIUM RISKโ
Compliance Frameworks: SOC2
Why: Metrics collection for monitoring
Required Controls:
- โ Encryption at Rest: EFS/EBS encryption
- โ ๏ธ Network Isolation: Not publicly accessible
- โ ๏ธ Data Retention: Define retention policies
- โ ๏ธ Label Security: Don't include PII in metric labels
Compliance Matrixโ
| Application | SOC2 | PCI-DSS | HIPAA | GDPR | FERPA | Risk Level |
|---|---|---|---|---|---|---|
| PostgreSQL | โ YES | โ YES | โ YES | โ YES | โ YES | ๐ด HIGH |
| Redis | โ YES | โ YES | โ YES | โ YES | โ YES | ๐ด HIGH |
| GitLab | โ YES | โ ๏ธ MAYBE | โ ๏ธ MAYBE | โ YES | โ YES | ๐ก MED-HIGH |
| Gitea | โ YES | โ ๏ธ MAYBE | โ ๏ธ MAYBE | โ YES | โ YES | ๐ก MEDIUM |
| Jenkins | โ YES | โ ๏ธ MAYBE | โ ๏ธ MAYBE | โ ๏ธ MAYBE | โ ๏ธ MAYBE | ๐ก MEDIUM |
| Drone | โ YES | โ ๏ธ MAYBE | โ ๏ธ MAYBE | โ ๏ธ MAYBE | โ ๏ธ MAYBE | ๐ก MEDIUM |
| Grafana | โ YES | โ NO | โ ๏ธ MAYBE | โ ๏ธ MAYBE | โ NO | ๐ข LOW-MED |
| Prometheus | โ YES | โ NO | โ ๏ธ MAYBE | โ ๏ธ MAYBE | โ NO | ๐ข LOW-MED |
Legend:
- โ YES: Likely to be in scope for this framework
- โ ๏ธ MAYBE: Depends on use case and data processed
- โ NO: Unlikely to be in scope
- ๐ด HIGH: Stores sensitive data directly
- ๐ก MEDIUM: Access to sensitive data or critical systems
- ๐ข LOW: Monitoring/observability tools
CloudForge Security Profile Mappingโ
PRODUCTION Profileโ
Automatically enforces compliance controls:
- โ Encryption at rest (EFS, EBS, S3)
- โ Private subnets with NAT gateways
- โ CloudWatch audit logging (2+ years retention)
- โ GuardDuty intrusion detection
- โ AWS Config compliance monitoring
- โ VPC Flow Logs
- โ WAF protection for web applications
- โ IAM least privilege roles
- โ MFA enforcement (when using Cognito)
- โ OIDC authentication with group-based access control
See Also: OIDC Authentication Guide for detailed authentication configuration including MFA, group-based access control, and logout integration.
Additional User Responsibilitiesโ
All Databases:
- Change default passwords immediately
- Use AWS Secrets Manager for credential storage
- Enable application-level audit logging
- Configure backup retention policies
- Implement data classification
Source Control & CI/CD:
- Enable MFA for all users
- Implement code review processes
- Use secret scanning tools
- Separate prod/non-prod environments
- Regular security updates
Monitoring Tools:
- Restrict access with authentication
- Avoid displaying PII/PHI in dashboards
- Configure data retention policies
Compliance Validationโ
CloudForge provides built-in compliance validation rules:
// Example: PCI-DSS Rules for databases
if (topology == TopologyType.DATABASE_SERVICE &&
complianceFrameworks.contains("PCI-DSS")) {
// Enforce:
// - Encryption at rest โ (automatic)
// - Private subnets only โ (enforced)
// - Audit logging enabled โ (automatic)
// - Strong password policy โ ๏ธ (user configures)
// - Network isolation โ (security groups)
}
Recommendations by Use Caseโ
Storing Payment Card Data (PCI-DSS)โ
Required Applications: PostgreSQL with strict controls
- Use PRODUCTION security profile
- Private subnets only (no public IPs)
- Enable pgAudit extension
- Quarterly vulnerability scans
- Penetration testing annually
- Consider: AWS RDS with PCI-compliant configuration instead
Storing Protected Health Information (HIPAA)โ
Required Applications: PostgreSQL, possibly Redis
- Use PRODUCTION security profile
- Sign AWS Business Associate Agreement (BAA)
- Enable encryption in transit (SSL/TLS)
- Implement audit logging (pgAudit)
- Data backup and disaster recovery plan
- Consider: AWS RDS/ElastiCache with HIPAA eligibility
General Business Data (SOC2)โ
Most Applications: Normal deployment
- Use PRODUCTION or STAGING profile
- Enable CloudWatch logging
- Implement access controls
- Regular security updates
Referencesโ
- PCI-DSS Requirements
- HIPAA Security Rule
- SOC 2 Trust Services Criteria
- GDPR Official Text
- CloudForge Security Profiles
โ ๏ธ IMPORTANT DISCLAIMER: This document provides general guidance only. Compliance requirements vary by organization, jurisdiction, and specific use cases. Consult with your legal and compliance teams for specific requirements. CloudForge provides security controls but cannot guarantee compliance - proper configuration and operational procedures are the user's responsibility.