-
Notifications
You must be signed in to change notification settings - Fork 1.9k
feat(compliance): add SOC2 AWS Processing Integrity requirements #9462
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(compliance): add SOC2 AWS Processing Integrity requirements #9462
Conversation
|
✅ All necessary |
|
✅ Conflict Markers Resolved All conflict markers have been successfully resolved in this pull request. |
🔒 Container Security ScanImage: 📊 Vulnerability Summary
3 package(s) affected
|
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #9462 +/- ##
==========================================
- Coverage 92.57% 90.62% -1.96%
==========================================
Files 155 834 +679
Lines 22023 23532 +1509
==========================================
+ Hits 20387 21325 +938
- Misses 1636 2207 +571
Flags with carried forward coverage won't be shown. Click here to find out more.
🚀 New features to boost your workflow:
|
jfagoagas
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Great addition 🎖️
Description
This pull request adds several new processing integrity controls to the SOC 2 AWS compliance configuration. These additions expand the coverage of automated checks for system inputs, data processing, outputs, and stored data, helping ensure completeness, accuracy, timeliness, and protection across AWS services.
New Processing Integrity Controls:
PI1.2to ensure system inputs are measured, recorded, and logged accurately and completely. This includes checks for logging on API Gateway, ELB, WAF, CloudTrail, and CloudFront.PI1.3to verify that data is processed as authorized, with controls for error detection, processing activity logging, and completeness. Includes checks for multi-region CloudTrail, log validation, metric filters, config recorder, RDS, Glue, and Step Functions logging.Output and Storage Protections:
PI1.4to ensure outputs are complete, accurate, and distributed only to intended parties, with encryption and access controls for S3, CloudWatch, SNS, Kinesis, CloudFront, and Glue outputs.PI1.5to protect stored data from unauthorized modification, theft, or corruption, including checks for S3 versioning/object lock, RDSSteps to review
Please add a detailed description of how to review this PR.
Checklist
UI
API
License
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.