Skip to main content

Cloud Security Checklist

Comprehensive security assessment guide for AWS, Azure, and GCP. Use this expert-curated checklist to evaluate your cloud security posture and ensure compliance with major frameworks including SOC2, PCI-DSS, and HIPAA.

Interactive Checklist

Track your progress, filter by category and priority, and download a PDF report.

Cloud Security Checklist by CloudRaft

Progress

0%

Completed

0/30

Identity & Access Management

Require MFA for all privileged accounts and administrative access

High PrioritySOC2PCI-DSSHIPAA

Grant minimum required permissions and regularly review access rights

High PrioritySOC2PCI-DSSHIPAAISO27001

Implement automatic rotation of API keys and service account credentials

High PrioritySOC2PCI-DSS

Regularly audit and deactivate dormant user accounts and service accounts

Medium PrioritySOC2HIPAA

Use predefined roles instead of individual permissions assignment

Medium PrioritySOC2ISO27001

Network Security

Set up proper network segmentation with private and public subnets

High PriorityPCI-DSSHIPAA

Configure subnet-level firewall rules to control traffic flow

High PriorityPCI-DSSSOC2

Configure instance-level firewalls with specific port and protocol rules

High PriorityPCI-DSSSOC2

Activate cloud provider DDoS protection services

Medium PrioritySOC2

Deploy WAF to protect web applications from common attacks

High PriorityPCI-DSSSOC2

Data Protection

Encrypt all stored data using strong encryption algorithms

High PriorityPCI-DSSHIPAAGDPR

Use TLS/SSL for all data transmission between services

High PriorityPCI-DSSHIPAAGDPR

Classify data based on sensitivity and apply appropriate protections

Medium PriorityGDPRHIPAASOC2

Set up automated backups with tested recovery procedures

High PrioritySOC2HIPAA

Deploy DLP tools to prevent unauthorized data exfiltration

Medium PriorityPCI-DSSHIPAA

Monitoring & Logging

Activate comprehensive logging for all API calls and resource changes

High PrioritySOC2PCI-DSSHIPAA

Implement SIEM or security monitoring tools for threat detection

High PrioritySOC2PCI-DSS

Set up real-time alerts for security events and anomalies

Medium PrioritySOC2PCI-DSS

Define and enforce appropriate log retention periods

Medium PrioritySOC2PCI-DSSHIPAA

Track and log all administrative and privileged user actions

High PrioritySOC2PCI-DSSHIPAA

Compliance & Governance

Perform quarterly security assessments and vulnerability scans

High PrioritySOC2PCI-DSSISO27001

Establish formal procedures for infrastructure and application changes

Medium PrioritySOC2ISO27001

Document comprehensive security policies and operational procedures

Medium PrioritySOC2HIPAAISO27001

Provide regular security awareness training for all employees

Medium PrioritySOC2PCI-DSSHIPAA

Conduct annual penetration testing by qualified third parties

High PriorityPCI-DSSSOC2

Container & Kubernetes

Implement automated container image scanning in CI/CD pipeline

High PrioritySOC2

Configure containers to run as non-root users

High PrioritySOC2

Apply Kubernetes Pod Security Standards or admission controllers

High PrioritySOC2

Implement Kubernetes network policies for pod-to-pod communication

Medium PrioritySOC2

Deploy runtime security tools like Falco or Tetragon

Medium PrioritySOC2

Need Help Implementing These Security Controls?

Our cloud security experts can help you implement and automate these security controls. Get a personalized security assessment and implementation roadmap.