Security, Cost & Well-Architected Frameworks

Compliance & Governance

3 min read

Enterprise architects must understand compliance requirements and governance frameworks. This knowledge demonstrates business acumen alongside technical expertise.

Compliance Frameworks

Common Standards

StandardIndustryKey Requirements
SOC 2SaaS/TechSecurity, availability, confidentiality
HIPAAHealthcarePHI protection, audit trails
PCI DSSFinanceCardholder data security
GDPREU DataData privacy, consent, right to erasure
FedRAMPUS GovernmentSecurity controls, continuous monitoring
ISO 27001GlobalInformation security management

AWS Compliance Programs

AWS maintains compliance certifications that customers can inherit:

CertificationBenefitCustomer Responsibility
SOC 1/2/3Financial controls auditedApplication-level controls
HIPAABAA availablePHI handling policies
PCI DSS Level 1Infrastructure compliantApplication PCI controls
ISO 27001Security frameworkImplement controls
FedRAMP HighGovernment approvedCustomer-side controls

Interview Question: HIPAA Architecture

Q: "Design a HIPAA-compliant architecture for a healthcare application."

A: Layered compliance approach:

HIPAA Architecture
├── Network Layer
│   ├── Private subnets for PHI
│   ├── VPN/Direct Connect only
│   └── No public internet access for PHI
├── Data Layer
│   ├── Encryption at rest (KMS)
│   ├── Encryption in transit (TLS)
│   └── Field-level encryption for SSN, DOB
├── Access Layer
│   ├── Role-based access (IAM)
│   ├── MFA required
│   └── Break-glass procedures logged
├── Audit Layer
│   ├── CloudTrail (all regions)
│   ├── VPC Flow Logs
│   └── Application audit logs
└── Administrative
    ├── BAA with AWS signed
    ├── Employee training documented
    └── Incident response plan

AWS Governance Tools

AWS Organizations

Structure for multi-account governance:

Organization Root
├── Core OU
│   ├── Security Account
│   ├── Logging Account
│   └── Network Account
├── Production OU
│   ├── Prod Account A
│   └── Prod Account B
├── Non-Production OU
│   ├── Dev Account
│   └── Staging Account
└── Sandbox OU
    └── Sandbox Account

Service Control Policies (SCPs)

SCP TypePurposeExample
Deny ListBlock specific actionsDeny EC2 in non-approved regions
Allow ListPermit only specificOnly allow approved services
GuardrailsPrevent risky changesPrevent CloudTrail disable

Example: Region Restriction SCP

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Deny",
      "Action": "*",
      "Resource": "*",
      "Condition": {
        "StringNotEquals": {
          "aws:RequestedRegion": [
            "us-east-1",
            "us-west-2",
            "eu-west-1"
          ]
        }
      }
    }
  ]
}

AWS Config

FeatureUse Case
Configuration RecordingTrack all resource changes
Conformance PacksPre-built compliance rules
RemediationAuto-fix non-compliant resources
AggregationMulti-account compliance view

Interview Question: Governance at Scale

Q: "How would you implement governance for 100+ AWS accounts?"

A: Centralized governance model:

  1. AWS Organizations

    • OU structure by environment/business unit
    • SCPs for guardrails
    • Consolidated billing
  2. Control Tower

    • Landing zone automation
    • Account factory for provisioning
    • Guardrails (preventive + detective)
  3. Centralized Services

    • Security Hub aggregation
    • Config aggregator
    • CloudTrail organization trail
  4. Automation

    • Account vending machine
    • Baseline CloudFormation StackSets
    • Automated compliance reporting

Data Governance

Data Classification

ClassificationExamplesControls
PublicMarketing materialsMinimal
InternalEmployee dataEncryption, access control
ConfidentialCustomer PIIEncryption, audit, DLP
RestrictedPayment data, PHIAll above + additional

Data Residency

RequirementImplementation
Region restrictionSCPs, AWS Config rules
Cross-border transferLegal review, encryption
Data localizationSingle-region deployment
Backup locationSame-region backup policies

Data Lifecycle

Creation → Classification → Storage → Use → Archival → Deletion
    ↓           ↓             ↓        ↓        ↓          ↓
Tagging    Auto-classify   Tiering  Access   Glacier   Secure
           (Macie)         (S3)     Logs     (S3)      Delete

Audit and Reporting

Audit Trail Requirements

Log TypeServiceRetention
API CallsCloudTrail7 years (compliance)
NetworkVPC Flow Logs1 year
ApplicationCloudWatch LogsPer requirement
DatabaseRDS/Aurora logsPer requirement

Compliance Reporting

ToolFunction
AWS ArtifactDownload compliance reports
Security HubCompliance score dashboard
ConfigCompliance timeline
Audit ManagerAutomated evidence collection

Interview Question: Audit Readiness

Q: "How do you prepare for a SOC 2 audit?"

A: Continuous compliance approach:

  1. Evidence Collection (Audit Manager)

    • Automated evidence gathering
    • Control mapping to SOC 2
  2. Continuous Monitoring

    • Config rules for each control
    • Security Hub for posture
    • Automated alerting on drift
  3. Documentation

    • Architecture diagrams current
    • Runbooks documented
    • Change management logs
  4. Pre-Audit

    • Internal assessment
    • Gap remediation
    • Mock audit walkthrough

Cloud Governance Best Practices

Governance Framework

ComponentImplementation
PoliciesWritten, versioned, accessible
StandardsTechnical requirements documented
ProceduresStep-by-step runbooks
GuidelinesBest practices, recommendations

Change Management

Request → Review → Approve → Implement → Verify → Close
   ↓        ↓        ↓          ↓          ↓       ↓
Ticket   CAB or   Workflow   CI/CD     Testing  Audit
         Auto-     (SNS)     Pipeline   Checks   Log
         approve

Key Insight: Compliance is not a one-time achievement—it's continuous. Automate compliance checks, evidence collection, and remediation to maintain audit readiness at scale.

Next module: Behavioral and negotiation strategies for architect interviews. :::

Quick check: how does this lesson land for you?

Quiz

Module 5: Security, Cost & Well-Architected Frameworks

Take Quiz
FREE WEEKLY NEWSLETTER

Stay on the Nerd Track

One email per week — courses, deep dives, tools, and AI experiments.

No spam. Unsubscribe anytime.