Turbot Guardrails includes thousands of prescriptive cloud controls to ensure cloud environments are secure and cost-optimized. These controls quickly detect issues as they occur and instantly correct misconfigurations. Customers often map Turbot Guardrails controls to their own Governance Risk Compliance (GRC) tools, and use the resulting evidence to prove continuous adherence to internal controls or external standards such as Center for Internet Security (CIS), NIST 800-53, PCI, GDPR, SOC2 etc.
Over the last year Turbot has open-sourced Steampipe.io, a tool that enables cloud engineers to easily query & report across their cloud, code, logs, and more, using the standard language of data: SQL. Steampipe includes thousands of ready-to-use controls and dashboards that deliver insights into your cloud data. These controls and dashboards leverage a suite of plugins that translate cloud APIs into Postgres tables. One of those plugins, by the way, translates the Turbot Guardrails v5 API into SQL-queryable tables!
Cloud teams have asked Turbot to also include industry standards within the Turbot Guardrails platform. We started by open-sourcing thousands of compliance controls, and enlisting the Steampipe community to provide feedback and contributions. Based on community feedback, we are now starting to port these control frameworks into Turbot Guardrails. Our first addition in Turbot Guardrails was the Payment Card Industry Data Security Standard (PCI DSS) v3.2.1 standard for AWS, followed by the Health Insurance Portability and Accountability (HIPAA) standard for AWS. Note: When mapping to external standards, Turbot Guardrails leverages either the published industry standard mapping or the mapping provided by each cloud provider. We are excited to add the HIPAA controls to the platform to complement our existing PCI & CIS Controls, along with AWS, Azure & GCP CIS benchmarks.
This post looks at how to enable HIPAA controls across all your AWS accounts in Turbot Guardrails.
There are various cloud-native and 3rd-party tools to evaluate cloud infrastructure HIPAA compliance. However cloud-native tools generally work with only one cloud provider, and only do periodic scans. 3rd-party tools may support multiple cloud providers, but fall short on benchmark coverage and, again, scan and report only periodically, missing real-time changes in your environment. These tools often work on a per-account basis, without delivering resource-level granularity. And they are limited in their ability to manage the time-based exceptions that enable you to handle the nuances in your organization.
Get it done with Turbot Guardrails
In Turbot Guardrails, HIPAA guardrails are readily available to control your cloud resource configurations. These guardrails work similar to others, continuously evaluating adherence as changes to your cloud resources occur. First, make sure you have the
@turbot/aws-hipaa mod installed and any dependent mods installed in your workspace. Then you can enable HIPAA through the following Turbot Guardrails policy in just a few clicks:
AWS > HIPAA:
Setting the configuration via the Turbot Guardrails Terraform Provider is just as simple:
After enabling this policy, Turbot Guardrails will immediately evaluate all applicable resources compliance with HIPAA. You can view your controls across major sections of the HIPAA standard:
Drill further into subsections:
Drill further to expand the subsections to view particular per cloud service controls:
Analyze which specific resources are impacted per control:
Inverse the view to visualize all primary controls on a particular resource:
Make it happen!
See for yourself on how easy it is to view your HIPAA requirements across your cloud resources. If you need any assistance, let us know in our Slack community #guardrails channel. If you are new to Turbot, connect with us to learn more!