Skip to main content

This is a new service. Help us improve it and give your feedback.

Development Standards

Cloud security alignment

Introduction

Cloud services MUST be designed and operated securely to protect sensitive data, maintain service availability and support public trust.

This guidance helps teams build secure systems by aligning with cloud provider best practices, enforcing strong access controls and ensuring visibility through logging and monitoring.

Guidance

Teams MUST:

  • follow the AWS or Azure Well-Architected Framework security pillar
  • encrypt all data in transit and at rest using approved cryptographic standards
  • apply the principle of least privilege to all IAM policies, roles and permissions
  • enable centralised logging and monitoring, integrated with the Security Operations Centre (SOC)
  • plan SOC onboarding early in the delivery lifecycle to ensure timely integration and alerting coverage

Measurement

The following indicators help assess whether cloud security practices are being applied consistently and effectively.

ID Indicator Green Amber Red
CSA-1 Cloud architecture reviews documented Reviewed and signed off by TRB Reviewed informally Not reviewed
CSA-2 Data encryption applied Encrypted in transit and at rest using approved standards Partial encryption or non-standard methods Not encrypted
CSA-3 IAM policies follow least privilege All roles scoped to minimum required access Some roles overly permissive No access control strategy
CSA-4 Logging and alerting configurations validated Validated and tested Configured but not tested Not configured
CSA-5 SOC onboarding completed SOC integrated and alerting live SOC engagement initiated No SOC engagement

References


Published: 17 July 2025
Last updated: 7 August 2025
Page Source