Cloud network security — remote access, vulnerability scanning, monitoring
Primary statement
Cloud network per CSA UEM-03 (remote access — MFA + encrypted connections) + TVM-02 (continuous or weekly IaaS scanning + 24h new deployment) + LOG-07 (logging scope including network flows) + ISO 27017 CLD.NET.1 (VPC/VNet isolation) + CLD.MON.1 (cloud SIEM integration) + SEBI cloud framework.
Audit-fatigue payoff
A unified cloud network programme — VPC isolation + remote access + continuous scanning + SIEM integration — satisfies cloud network requirements across all 3 contributing frameworks.
Strictness matrix
Scope
Scope: cloud infrastructure scanned continuously or AT LEAST WEEKLY for IaaS; within 24 hours of new deployment.
Ceiling source: csa_ccm:CSA.TVM-02
Rationale: CSA TVM-02 weekly + 24h scope is uniquely strict.
Threshold
Threshold: remote access requires MFA + encrypted connections (VPN or Zero Trust Network Access). Both conditions binary.
Ceiling source: csa_ccm:CSA.UEM-03
Rationale: CSA UEM-03 MFA + encryption threshold is binary.
Method
Method: VPC/VNet network-level isolation + security groups + traffic inspection + continuous/weekly scanning (TVM-02) + remote access security (UEM-03) + cloud-specific logging (LOG-07) + SIEM integration (CLD.MON.1).
Ceiling source: iso27017:CLD.NET.1
Rationale: ISO 27017 + CSA + SEBI combined are most prescriptive.
Frequency
Cloud scanning continuous or weekly. New deployment within 24h. Network architecture review annual.
Ceiling source: csa_ccm:CSA.TVM-02
Rationale: Weekly minimum scanning is the audit-defensible cadence.
Evidence
Evidence: VPC architecture + security groups + scanning configuration + remote access MFA + logging coverage + SIEM integration.
Ceiling source: iso27017:CLD.NET.1
Rationale: ISO 27017 CLD.NET.1 evidence is the audit anchor.
Auditor test pattern
Step 1: Inspect VPC architecture. Step 2: Verify security groups + traffic inspection. Step 3: Verify scanning cadence (weekly minimum). Step 4: Verify remote access MFA + encryption.
Common findings
Common findings: (1) Cloud scanning monthly not weekly; (2) New deployment not scanned within 24h; (3) Remote access via password only; (4) VPC architecture flat — no segmentation.