Regulatory compliance

A workload can have regulatory requirements, which may mandate that operational data, such as application logs and metrics, remain within a certain geo-political region.

These requirements may need strict security measures that affect the overall architecture, the selection, and configuration of specific PaaS, and SaaS services. The requirements also have implications for how the workload should be operationalized.

Key points

  • Make sure that all regulatory and governance requirements are known, and well understood.
  • Periodically perform external and, or internal workload security audits.
  • Have compliance checks as part of the workload operations.
  • Use Microsoft Trust Center.

Review the requirements

Regulatory organizations frequently publish standards and updates to help define good security practices so that organizations can avoid negligence. The purpose and scope of these standards, and regulations vary. The security requirements, however, can influence the design for data protection and retention, network access, and system security.

Knowing whether your cloud resources are in compliance with standards mandated by governments or industry organizations is essential in today's globalized world.

For example, a workload that handles credit card transactions is subject to the Payment Card Industry (PCI) standard. One of the requirements prohibits access between the internet and any system component in the cardholder data environment.

To provide a restrictive environment, you can choose to do the following:

  • Host the workload in different Azure compute options that supports bring your own VNet.
  • Remove any internet-facing endpoints by using Private Endpoints.
  • Use network security groups (NSGs) rules that define authorized inbound and outbound access.

Noncompliance can lead to fines or other business impact. Work with your regulators and carefully review the standard to understand both the intent and the literal wording of each requirement. Here are some questions that may help you understand each requirement.

  • How is compliance measured?
  • Who approves that the workload meets the requirements?
  • Are there processes for obtaining attestations?
  • What are the documentation requirements?

Suggested action

Use Microsoft Defender for Cloud to assess your current compliance score and to identify the gaps.

Learn more

Tutorial: Improve your regulatory compliance

Use the Microsoft Trust Center

Keep checking the Microsoft Trust Center for the latest information, news, and best practices in security, privacy, and compliance.

  • Data governance. Focus on protecting information in cloud services, mobile devices, workstations, or collaboration platforms. Build the security strategy by classifying and labeling information. Use strong access control and encryption technology.

  • Compliance offerings. Microsoft offers a comprehensive set of compliance offerings to help your organization follow national, regional, and industry-specific requirements governing the collection and use of data. For information, see Compliance offerings.

  • Compliance score. Use Microsoft Compliance Score to assess your data protection controls on an ongoing basis. Act on the recommendations to make progress toward compliance.

  • Audit reports. Use audit reports to stay current on the latest privacy, security, and compliance-related information for Microsoft's cloud services. See Audit Reports.

  • Shared responsibility. The workload can be hosted on Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), or in an on-premises datacenter. Have a clear understanding about the portions of the architecture you're responsible for versus Azure. Whatever the hosting model, the following responsibilities are always retained by you:

    • Data
    • Endpoints
    • Account
    • Access management

    For more information, reference Shared responsibility in the cloud.

Elevated security capabilities

Consider whether to use specialized security capabilities in your enterprise architecture.

Dedicated HSMs and Confidential Computing have the potential to enhance security and meet regulatory requirements, but can introduce complexity that may negatively impact your operations and efficiency.

Suggested actions

We recommend careful consideration and judicious use of these security measures as required:

Learn more about elevated security capabilities for Azure workloads.

Operational considerations

Regulatory requirements may influence the workload operations. For example, there might be a requirement that operational data, such as application logs and metrics, remain within a certain geo-political region.

Consider automation of deployment and maintenance tasks. Automation reduces security and compliance risk by limiting opportunity to introduce human errors during manual tasks.

Azure maintains a compliance portfolio that covers US government, industry specific, and region/country standards. For more information, reference Azure compliance offerings.

Monitor the compliance of the workload to check if the security controls are aligned to the regulatory requirements. For more information, reference Security audits.

Go back to the main article: Governance

Next