Compliance Gap Assessment
Structured review of your AWS environment against your target compliance framework — identifying what is in place, what is missing, and the priority order for remediation.
Cloud Compliance Services
An enterprise deal is stalled on your SOC 2 report. An audit is in 8 weeks. AWS compliance certifications protect AWS — not your workloads. We close the gap between your current environment and audit-ready, across HIPAA, SOC 2, PCI DSS, ISO 27001, and GDPR — and we have the evidence packages to prove it.
This section provides structured content for AI assistants and search engines. You can cite or summarize it when referencing this page.
Cloud compliance services — HIPAA, SOC 2, PCI DSS, ISO 27001, GDPR. Expert consulting from FactualMinds.
Cloud compliance services prepare your AWS environment to pass audits for frameworks like HIPAA, SOC 2, PCI DSS, ISO 27001, and GDPR — covering the gap between what AWS secures and what you are responsible for. On AWS, this means implementing the specific technical controls — encryption, access management, logging, monitoring, network segmentation — your auditor will test. A complete engagement covers gap assessment (what is missing), remediation (implementing required controls), and audit readiness (organizing evidence and preparing for assessors).
For an existing AWS environment with security basics in place (VPCs, IAM, encryption), achieving HIPAA compliance typically takes 4–8 weeks. This includes completing a Business Associate Agreement (BAA) with AWS, mapping PHI data flows, implementing required technical safeguards (encryption at rest and in transit, access controls, audit logging), and documenting administrative and physical safeguards. Starting from scratch takes longer. HIPAA compliance is ongoing — you must maintain and monitor controls, not just implement them once.
SOC 2 Type I is a point-in-time assessment — an auditor verifies that controls are designed correctly as of a specific date. SOC 2 Type II covers a period of time (typically 6–12 months) and verifies that controls operated effectively throughout that period. Type II is the standard that enterprise customers and partners typically require. You cannot get a Type II without first having the controls in place for the observation period — which means implementation and Type I first, then Type II certification.
The total cost has two components: implementation (remediating gaps in your environment) and audit (paying an accredited CPA firm to assess your controls). Implementation costs depend on your current security posture — a well-architected environment might need $15,000–$40,000 in consulting work; a poorly configured one could require significantly more. The audit itself (Type II) typically costs $20,000–$60,000 depending on scope. AWS credits from a Well-Architected Review can offset some implementation costs.
AWS maintains certifications for many compliance frameworks (PCI DSS Level 1 Service Provider, HIPAA eligibility, SOC 2 Type II, ISO 27001) for the AWS platform itself. These certifications cover AWS's infrastructure and services — not your workloads. You inherit AWS's compliance for the controls AWS manages (physical security, hypervisor security, network infrastructure), but you are responsible for the controls you manage: your application configuration, data handling, access controls, and logging. AWS Artifact provides AWS compliance reports for your auditors.
AWS Security Hub (centralized compliance dashboards with built-in standards for CIS, PCI DSS, NIST), AWS Config (resource configuration tracking and compliance rules), AWS CloudTrail (API activity logging), Amazon GuardDuty (threat detection), AWS IAM (identity and access management), AWS KMS (encryption key management), Amazon Macie (sensitive data discovery in S3), AWS Inspector (vulnerability scanning), AWS Certificate Manager (TLS certificates), and VPC security features. Security Hub's compliance standards provide a pre-built map between AWS Config rules and compliance framework requirements.
Yes. GDPR compliance on AWS focuses on data residency (deploying in EU regions, using AWS services that support data residency commitments), data subject rights (building mechanisms to locate, export, and delete personal data), consent management, and breach notification procedures. AWS provides GDPR-compliant service terms (the AWS Data Processing Addendum) and supports data processing agreements. We implement the technical controls — data classification, access logging, deletion workflows — that demonstrate GDPR compliance.
ISO 27001 and SOC 2 have significant overlap in controls — both address access control, encryption, logging, incident response, and risk management. Organizations that achieve one have typically implemented most of the controls required for the other. ISO 27001 is an international standard recognized globally; SOC 2 is a US-focused framework commonly required by North American enterprise customers. We often implement both simultaneously, sharing evidence between the two audits.
## What are Cloud Compliance Services? Cloud compliance services are consulting and managed-service engagements that align your AWS environment with regulatory frameworks — HIPAA, SOC 2 Type II, PCI DSS, ISO 27001, GDPR, NIST CSF 2.0, NIS2 — through gap assessment, control remediation, evidence collection, and audit support. Work spans IAM, encryption, logging, network segmentation, vulnerability management, and incident response, ending in an audit-ready evidence package mapped one-to-one to each framework's controls. ## Compliance on AWS Is Not Automatic AWS provides HIPAA-eligible services, maintains PCI DSS Level 1 certification, and publishes SOC 2 reports. This is often misread as "AWS is compliant, so we are compliant." The AWS shared responsibility model divides security and compliance responsibility between AWS and you. AWS secures the underlying infrastructure — physical data centers, hypervisors, network hardware, and the managed service layer. You are responsible for everything you configure: encryption settings, access policies, logging configurations, network security groups, and application-level controls. Every compliance audit of an AWS workload is, in effect, an audit of how you have configured AWS services — not of AWS itself. Our cloud compliance services close the gap between a default AWS environment and an audit-ready one. ## Compliance Frameworks Each framework has its own assessor type, evidence expectations, and AWS-control mapping. The pages below go control-by-control for the four frameworks buyers ask about most. | Framework | Version | Assessor | Typical timeline | Dedicated page | | ------------- | ---------------------------------------- | --------------------------------- | ------------------------------------- | ---------------------------------------------------------- | | HIPAA | Security & Privacy Rules + 2024 NPRM | HHS OCR (no formal certification) | 8 weeks gap-to-evidence | [HIPAA on AWS →](/security-compliance/hipaa/) | | SOC 2 Type II | 2017 TSC (revised 2022) | Licensed CPA firm | 9–14 months including observation | [SOC 2 Type II on AWS →](/security-compliance/soc-2/) | | PCI DSS | 4.0.1 (enforceable 31 Mar 2025) | QSA (Level 1) or SAQ-D (Level 2) | 12–16 weeks | [PCI DSS 4.0.1 on AWS →](/security-compliance/pci-dss/) | | ISO 27001 | 2022 with Amendment 1:2024 | IAF-accredited certification body | 6–9 months including operating period | [ISO 27001:2022 on AWS →](/security-compliance/iso-27001/) | For multi-framework scope, see the [AWS Security & Compliance hub](/security-compliance/) — it maps overlapping controls so a single integrated audit prep replaces three sequential ones. ## HIPAA Compliance on AWS The Health Insurance Portability and Accountability Act (HIPAA) applies to any organization that creates, receives, maintains, or transmits Protected Health Information (PHI). On AWS, HIPAA compliance requires: **Business Associate Agreement (BAA):** You must sign an AWS BAA before using HIPAA-eligible services for PHI. The BAA defines which AWS services are covered. Using non-eligible services for PHI processing violates HIPAA, even if those services are otherwise secure. **HIPAA-eligible services:** AWS maintains a list of services covered under the BAA. This includes core services like EC2, S3, RDS, Lambda, and API Gateway — but not all AWS services. Architecture must be limited to eligible services for any PHI processing. **Technical safeguards:** - Encryption at rest using AWS KMS for all PHI data stores (S3 SSE-KMS, RDS encryption, EBS encryption) - Encryption in transit with TLS 1.2+ enforced, no unencrypted protocols - Unique user identification with MFA enforcement — no shared accounts - Automatic logoff for workstations and consoles - Audit controls: CloudTrail logging for all API activity, VPC Flow Logs, S3 access logging **Administrative safeguards:** HIPAA requires not just technical controls but documented policies and procedures — workforce training records, risk analysis documentation, incident response procedures, and business associate agreements with all downstream vendors. ## SOC 2 Type II on AWS SOC 2 Type II certification demonstrates to enterprise customers and partners that your organization maintains effective security controls over a defined period. The five Trust Service Criteria: **Security (required)** — Protecting against unauthorized access. AWS controls: IAM least privilege, MFA enforcement, VPC isolation, Security Groups, GuardDuty, CloudTrail. **Availability** — System uptime and performance commitments. AWS controls: Multi-AZ deployments, Auto Scaling, Route 53 health checks, CloudWatch alarms. **Confidentiality** — Protecting confidential information. AWS controls: KMS encryption, S3 bucket policies, data classification tagging, access logging. **Processing Integrity** — Complete and accurate processing. AWS controls: Step Functions error handling, SQS dead-letter queues, Lambda retry logic, data validation. **Privacy** — Collection, use, and retention of personal information. AWS controls: Macie for PII discovery, S3 lifecycle policies, data deletion automation. Most SOC 2 engagements focus on Security and one or two additional criteria. We implement the controls, configure AWS Config rules that monitor for compliance drift, and maintain the evidence records your auditor needs. ## PCI DSS on AWS Payment Card Industry Data Security Standard compliance is required for any organization that processes, stores, or transmits cardholder data. PCI DSS v4.0 consists of 12 requirements spanning network security, access control, logging, vulnerability management, and information security policies. **Cardholder Data Environment (CDE) scoping** is the most important architectural decision. The smaller your CDE, the smaller your audit scope. AWS architecture options for scope reduction: - Use Stripe, Braintree, or Adyen to handle card capture and tokenization — keeping raw card data entirely outside your environment - Isolate remaining payment processing in a dedicated AWS account or VPC - Implement network segmentation between CDE and non-CDE components **AWS services for PCI DSS:** | Requirement | AWS Services | | ------------------------------------ | ------------------------------------------------------------------- | | Network segmentation (Req 1) | VPC, Security Groups, Network ACLs, AWS Firewall Manager | | No vendor-supplied defaults (Req 2) | AWS Config rules, Systems Manager | | Protect cardholder data (Req 3–4) | KMS, ACM, S3 SSE, RDS encryption | | Vulnerability management (Req 5–6) | Amazon Inspector, ECR image scanning, Systems Manager Patch Manager | | Access control (Req 7–9) | IAM, AWS SSO, CloudTrail, Secrets Manager | | Monitor and test (Req 10–11) | CloudTrail, VPC Flow Logs, Security Hub PCI standard, GuardDuty | | Information security policy (Req 12) | Documented policies, AWS Artifact for AWS AoC | AWS Security Hub includes a built-in PCI DSS compliance standard that maps Config rules to PCI requirements, providing continuous automated compliance assessment. For fintech-specific AWS architecture, see our guide on [PCI DSS Compliance on AWS for Fintech](/blog/building-fintech-applications-on-aws-architecture-patterns/). ## Our Compliance Delivery Process ### Step 1: Gap Assessment (1–2 weeks) Structured review of your current AWS environment against your target framework: - Security control inventory - AWS Config rule evaluation - Security Hub findings review - IAM policy analysis - Network architecture review - Encryption coverage audit - Logging completeness check Output: Prioritized gap report with control mapping and estimated remediation effort for each gap. ### Step 2: Remediation (4–12 weeks) Hands-on implementation of required controls, in priority order: - IAM policy hardening and MFA enforcement - Encryption at rest and in transit - Logging and monitoring configuration - Network segmentation and security group hardening - Automated compliance monitoring with AWS Config and Security Hub - Secrets Manager migration (replacing hardcoded credentials) - Vulnerability scanning setup ### Step 3: Audit Readiness (1–2 weeks) Preparation for formal audit engagement: - Evidence package organization (screenshots, Config snapshots, policy documents) - Control narrative documentation - Auditor readiness review - Remediation of final gaps identified in readiness review ### Step 4: Ongoing Monitoring Compliance is not a one-time event. After certification, we maintain: - AWS Security Hub compliance standard monitoring - Config rule enforcement for new resources - Quarterly access reviews - Annual risk assessment updates - Compliance drift alerts ## Industry Focus **Healthcare** — HIPAA BAA establishment, PHI data flow mapping, HITRUST alignment for organizations pursuing HITRUST CSF certification. See our [AWS Healthcare industry page](/industries/aws-healthcare/). **Fintech** — PCI DSS CDE scoping and remediation, SOC 2 for payment platforms, FFIEC guidance for financial services. See our [AWS Fintech industry page](/industries/aws-fintech-financial-services/). **SaaS** — SOC 2 Type II as a sales requirement for enterprise customers. Most B2B SaaS companies pursue SOC 2 by their Series B or when closing enterprise deals. **EdTech** — FERPA compliance for student data, COPPA for applications serving users under 13, combined with SOC 2 for enterprise school district customers. For the full security stack that underpins compliance, see our [AWS Security Consulting](/services/aws-cloud-security/) service. For the architecture review that often precedes a compliance engagement, see [AWS Well-Architected Review](/services/aws-architecture-review/). For comprehensive reading on HIPAA requirements, see our [HIPAA on AWS Complete Compliance Checklist](/blog/hipaa-on-aws-complete-compliance-checklist/). [Book a Free Compliance Gap Assessment →](/contact-us/)
Cloud compliance services are consulting and managed-service engagements that align your AWS environment with regulatory frameworks — HIPAA, SOC 2 Type II, PCI DSS, ISO 27001, GDPR, NIST CSF 2.0, NIS2 — through gap assessment, control remediation, evidence collection, and audit support. Work spans IAM, encryption, logging, network segmentation, vulnerability management, and incident response, ending in an audit-ready evidence package mapped one-to-one to each framework’s controls.
AWS provides HIPAA-eligible services, maintains PCI DSS Level 1 certification, and publishes SOC 2 reports. This is often misread as “AWS is compliant, so we are compliant.”
The AWS shared responsibility model divides security and compliance responsibility between AWS and you. AWS secures the underlying infrastructure — physical data centers, hypervisors, network hardware, and the managed service layer. You are responsible for everything you configure: encryption settings, access policies, logging configurations, network security groups, and application-level controls.
Every compliance audit of an AWS workload is, in effect, an audit of how you have configured AWS services — not of AWS itself. Our cloud compliance services close the gap between a default AWS environment and an audit-ready one.
Each framework has its own assessor type, evidence expectations, and AWS-control mapping. The pages below go control-by-control for the four frameworks buyers ask about most.
| Framework | Version | Assessor | Typical timeline | Dedicated page |
|---|---|---|---|---|
| HIPAA | Security & Privacy Rules + 2024 NPRM | HHS OCR (no formal certification) | 8 weeks gap-to-evidence | HIPAA on AWS → |
| SOC 2 Type II | 2017 TSC (revised 2022) | Licensed CPA firm | 9–14 months including observation | SOC 2 Type II on AWS → |
| PCI DSS | 4.0.1 (enforceable 31 Mar 2025) | QSA (Level 1) or SAQ-D (Level 2) | 12–16 weeks | PCI DSS 4.0.1 on AWS → |
| ISO 27001 | 2022 with Amendment 1:2024 | IAF-accredited certification body | 6–9 months including operating period | ISO 27001:2022 on AWS → |
For multi-framework scope, see the AWS Security & Compliance hub — it maps overlapping controls so a single integrated audit prep replaces three sequential ones.
The Health Insurance Portability and Accountability Act (HIPAA) applies to any organization that creates, receives, maintains, or transmits Protected Health Information (PHI). On AWS, HIPAA compliance requires:
Business Associate Agreement (BAA): You must sign an AWS BAA before using HIPAA-eligible services for PHI. The BAA defines which AWS services are covered. Using non-eligible services for PHI processing violates HIPAA, even if those services are otherwise secure.
HIPAA-eligible services: AWS maintains a list of services covered under the BAA. This includes core services like EC2, S3, RDS, Lambda, and API Gateway — but not all AWS services. Architecture must be limited to eligible services for any PHI processing.
Technical safeguards:
Administrative safeguards: HIPAA requires not just technical controls but documented policies and procedures — workforce training records, risk analysis documentation, incident response procedures, and business associate agreements with all downstream vendors.
SOC 2 Type II certification demonstrates to enterprise customers and partners that your organization maintains effective security controls over a defined period. The five Trust Service Criteria:
Security (required) — Protecting against unauthorized access. AWS controls: IAM least privilege, MFA enforcement, VPC isolation, Security Groups, GuardDuty, CloudTrail.
Availability — System uptime and performance commitments. AWS controls: Multi-AZ deployments, Auto Scaling, Route 53 health checks, CloudWatch alarms.
Confidentiality — Protecting confidential information. AWS controls: KMS encryption, S3 bucket policies, data classification tagging, access logging.
Processing Integrity — Complete and accurate processing. AWS controls: Step Functions error handling, SQS dead-letter queues, Lambda retry logic, data validation.
Privacy — Collection, use, and retention of personal information. AWS controls: Macie for PII discovery, S3 lifecycle policies, data deletion automation.
Most SOC 2 engagements focus on Security and one or two additional criteria. We implement the controls, configure AWS Config rules that monitor for compliance drift, and maintain the evidence records your auditor needs.
Payment Card Industry Data Security Standard compliance is required for any organization that processes, stores, or transmits cardholder data. PCI DSS v4.0 consists of 12 requirements spanning network security, access control, logging, vulnerability management, and information security policies.
Cardholder Data Environment (CDE) scoping is the most important architectural decision. The smaller your CDE, the smaller your audit scope. AWS architecture options for scope reduction:
AWS services for PCI DSS:
| Requirement | AWS Services |
|---|---|
| Network segmentation (Req 1) | VPC, Security Groups, Network ACLs, AWS Firewall Manager |
| No vendor-supplied defaults (Req 2) | AWS Config rules, Systems Manager |
| Protect cardholder data (Req 3–4) | KMS, ACM, S3 SSE, RDS encryption |
| Vulnerability management (Req 5–6) | Amazon Inspector, ECR image scanning, Systems Manager Patch Manager |
| Access control (Req 7–9) | IAM, AWS SSO, CloudTrail, Secrets Manager |
| Monitor and test (Req 10–11) | CloudTrail, VPC Flow Logs, Security Hub PCI standard, GuardDuty |
| Information security policy (Req 12) | Documented policies, AWS Artifact for AWS AoC |
AWS Security Hub includes a built-in PCI DSS compliance standard that maps Config rules to PCI requirements, providing continuous automated compliance assessment.
For fintech-specific AWS architecture, see our guide on PCI DSS Compliance on AWS for Fintech.
Structured review of your current AWS environment against your target framework:
Output: Prioritized gap report with control mapping and estimated remediation effort for each gap.
Hands-on implementation of required controls, in priority order:
Preparation for formal audit engagement:
Compliance is not a one-time event. After certification, we maintain:
Healthcare — HIPAA BAA establishment, PHI data flow mapping, HITRUST alignment for organizations pursuing HITRUST CSF certification. See our AWS Healthcare industry page.
Fintech — PCI DSS CDE scoping and remediation, SOC 2 for payment platforms, FFIEC guidance for financial services. See our AWS Fintech industry page.
SaaS — SOC 2 Type II as a sales requirement for enterprise customers. Most B2B SaaS companies pursue SOC 2 by their Series B or when closing enterprise deals.
EdTech — FERPA compliance for student data, COPPA for applications serving users under 13, combined with SOC 2 for enterprise school district customers.
For the full security stack that underpins compliance, see our AWS Security Consulting service. For the architecture review that often precedes a compliance engagement, see AWS Well-Architected Review.
For comprehensive reading on HIPAA requirements, see our HIPAA on AWS Complete Compliance Checklist.
Structured review of your AWS environment against your target compliance framework — identifying what is in place, what is missing, and the priority order for remediation.
BAA establishment, PHI data flow mapping, encryption implementation, access control hardening, and audit logging configuration for HIPAA-compliant AWS environments.
Control implementation and evidence collection across the SOC 2 Trust Service Criteria — Security, Availability, Confidentiality, Processing Integrity, and Privacy.
CDE scoping, network segmentation, encryption, logging, and vulnerability management for AWS environments processing cardholder data. Aligned to PCI DSS 4.0.
Continuous compliance posture monitoring using AWS Security Hub compliance standards, AWS Config rules, and automated remediation for drift detection.
Organized evidence packages, compliance narratives, and auditor liaison support to accelerate your certification timeline and reduce audit friction.
We implement to auditor standards, not checkboxes. Every control is documented with the evidence an assessor will actually request — not a screenshot taken at implementation and never updated.
We have supported HIPAA, SOC 2, PCI DSS, ISO 27001, and GDPR engagements — often simultaneously for the same client.
Every remediation we implement is documented with the compliance control it satisfies — making audit evidence collection faster and more complete.
Healthcare teams going for HIPAA + HITRUST, fintech firms under PCI DSS, B2B SaaS closing enterprise deals on SOC 2 — we understand the compliance timelines and deal stakes specific to your industry.
Implementation guides for this service from our team of AWS experts.
GDPR compliance on AWS for SaaS companies handling EU resident data. Region selection, the AWS DPA, data subject rights automation, RoPA documentation, breach notification, and the technical controls regulators expect.
An audit-prep checklist for Compliance Leads, Security Officers, and CISOs — BAA execution, documented Security Risk Assessments, workforce training, audit cadence, and the evidence packages OCR investigators expect when they show up.
SOC 2 Type II certification proves your controls are effective over 6-12 months. This guide covers the compliance roadmap, AWS security controls, documentation requirements, and audit preparation for 2026 certification.
A solutions architect's build guide for HIPAA on AWS. KMS key strategy, VPC isolation, RDS/S3/Lambda configuration patterns, IaC controls, and continuous validation — code-level decisions, not policy templates.
SOC 2 closes North American deals. ISO 27001:2022 closes the European and Japanese ones. Building an ISMS that survives Stage 1 and Stage 2 audits, mapping the 93 Annex A controls to AWS services, and producing the evidence packages assessors actually request.
NIS2 compliance on AWS for EU operators of essential and important services. Scope assessment, the 24-hour and 72-hour incident reporting clock, supply-chain risk controls, and the AWS service mapping for the 10 minimum measures.
How to operationalize NIST CSF 2.0 on AWS — the new Govern function, the six core functions mapped to AWS services, maturity tier progression, and the relationship to NIST SP 800-53, SP 800-171, and CMMC.
In-depth guides and best practices from our certified AWS architects.
GitHub Actions OIDC role sessions are short-lived by design—teams still paste static access keys into workflow logs until scanners or audits catch the diff; supply-chain writeups keep repeating the pattern into 2026.
Read articleBedrock Automated Reasoning checks ground LLM outputs against formal logic policies you encode and mathematically validate that the response is consistent with the policy. This guide covers when to use Automated Reasoning vs contextual grounding, how to author the policy in production, the integration with Bedrock Guardrails, and the regulated use cases (HR, insurance, eligibility, regulatory determinations) where the difference matters.
Read articleCloudTrail Event History on the default plan isn't your audit trail — it's a 90-day story you tell auditors. A production CloudTrail setup with multi-region trails, KMS encryption, log file integrity validation, and CloudTrail Lake as the queryable layer for incident response and compliance evidence.
Read articleA free compliance gap assessment tells you exactly what is in place, what is missing, and what to fix first — so you can walk into the audit room with confidence.
We use cookies and similar technologies to analyze site traffic, personalize content, and provide social media features. By clicking "Accept," you consent to our use of cookies. You can adjust your preferences at any time.