Cloud Identity and Access Management — federation, vulnerability testing, monitoring
Primary statement
Cloud IAM operates as ISO 27001 A.5.23 cloud services management + CSA TVM-03 cloud penetration testing + CSA LOG-04 cloud-specific detections + CSA LOG-01 cloud logging coverage + ISO 27017 CLD.9.5.1 tenant isolation. Cloud IAM is the new perimeter; identity is the new firewall.
Audit-fatigue payoff
A unified cloud IAM architecture — federation + MFA + privileged access + cloud-specific monitoring + tenant isolation — satisfies cloud IAM requirements across all 6 contributing frameworks.
Strictness matrix
Scope
Scope: acquisition, use, management, and exit from cloud services. Lifecycle scope — not just operations.
Ceiling source: iso27001:A.5.23
Rationale: ISO 27001 A.5.23 lifecycle scope is the broadest cloud services scope.
Threshold
Threshold: cloud penetration testing at least annually by qualified third party + after significant architectural change. Annual binary cadence.
Ceiling source: csa_ccm:CSA.TVM-03
Rationale: CSA TVM-03 annual cloud pen test is the audit-defensible threshold.
Method
Method: cloud IAM federation + MFA + privileged access + cloud-specific detection rules (credential compromise, resource hijacking, lateral movement) + cloud logging coverage (LOG-01 control plane + data plane + network) + tenant isolation (ISO 27017 CLD.9.5.1) + annual cloud pen test.
Ceiling source: csa_ccm:CSA.LOG-04
Rationale: CSA LOG-04 cloud-specific detections + LOG-01 logging coverage are uniquely strict.
Frequency
Cloud pen test: annual + on architectural change. Cloud detection rule tuning: continuous. IAM review: quarterly per cl-access-rights.
Ceiling source: csa_ccm:CSA.TVM-03
Rationale: Annual cloud pen test is the audit-defensible cadence.
Evidence
Evidence: cloud IAM federation + cloud pen test reports + cloud-specific detection rule inventory + cloud logging configuration + tenant isolation evidence + sample detection alerts traced to response.
Ceiling source: csa_ccm:CSA.LOG-04
Rationale: CSA LOG-04 evidence with cloud-specific detections is the audit anchor.
Auditor test pattern
Step 1: Inspect cloud IAM federation. Step 2: Inspect annual cloud pen test report. Step 3: Verify cloud-specific detection rules (credential compromise, resource hijacking). Step 4: Verify cloud logging coverage (control plane + data plane + network). Step 5: Verify tenant isolation.
Common findings
Common findings: (1) Cloud pen test annual but generic, not cloud-specific; (2) Cloud-specific detections absent; (3) Logging covers some planes but not network flows; (4) Tenant isolation accepted on CSP attestation without verification.