Amazon Web Services (AWS) Integration
Use Amazon Web Services (AWS) as an evidence source in Aurora Command. Capture evidence automatically where supported, or attach exports when you need to. Aurora keeps the source, timestamp, owner, and review history so evidence stays reusable between reviews.
Common coverage includes Backups, Cloud audit logging, and Cloud Security Management --- Cloud security management.
No compliance guarantees. We'll confirm what's automated and what stays export-based.
At a Glance
Best for
Continuous checks and evidence capture
Auth
Aws Assume Role
Cadence
Every 1 hours
Setup time
10 to 20 minutes
Framework coverage
Aurora Essentials (Baseline Control Set) and 52 more
Artifacts reviewers recognize. Preview sample structures before you share anything.
Setup
01
Connect Amazon Web Services (AWS)
Sign-in method: Aws Assume Role. Start with least-privilege access where supported.
02
Confirm Evidence Sources and Cadence
Confirm evidence sources and set cadence (every 1 hours).
03
Validate Capture (Read-Only Where Possible)
Validate evidence capture in read-only mode (where possible) before expanding workflows.
04
Map Evidence to Controls
Map captured artifacts to controls (7 mapped controls listed).
05
Bundle evidence when needed
Export an evidence bundle (ZIP) when you need an offline attachment. Aurora keeps the underlying source and timestamps so the work stays reusable.
What This Integration Captures
What Aurora monitors
32 continuous checks
AWS CloudTrail is enabled in all regions • AWS CloudTrail is enabled and healthy
Evidence Aurora can collect
5 evidence types
Accounts • User accounts
How it stays current
Incremental updates every 1 hours. Full refresh daily.
Checks update as new data is synced.
Checks
Automated checks Aurora can run
Checks map directly to common buyer requirements. Reviewers see the result as exportable evidence, not a screenshot.
AWS CloudTrail is enabled in all regions
AWS CloudTrail is enabled and healthy
AWS CloudTrail log file validation is enabled
AWS CloudTrail logs are encrypted with KMS
AWS CloudTrail includes global service events
AWS CloudTrail logs all management events (read/write)
CloudTrail destination S3 buckets deny insecure transport
CloudTrail destination S3 buckets have default encryption enabled
CloudTrail destination S3 buckets have versioning enabled
CloudTrail destination S3 buckets enforce Public Access Block
AWS Organizations management account has an Organization Trail enabled
S3 public access block is enabled account-wide
And 20 more checks.
Evidence
Evidence types collected
These evidence objects can be mapped to controls and exported as an evidence bundle or audit workbook snapshot.
Produces
- Evidence objects with source details
- Freshness and cadence status
- Evidence bundle exports (plan-based)
Security Note
Read-only API, scoped credentials, and an audit trail (where supported by the connector and your environment).
Cadence Controls
Incremental updates every 1 hours. Full refresh daily.
Why It Matters for Reviewers
- Reduces “show me” follow-ups by attaching system exports to answers.
- Keeps timestamps explicit for audit windows.
- Makes sampling easier through evidence bundles.
Controls and Frameworks Impacted
Aurora Essentials (Baseline Control Set)
AURORA_ESS
7 controls
CSA Consensus Assessments Initiative Questionnaire (CAIQ) v4.0.3
CAIQ
5 controls
CSA Cloud Controls Matrix (CCM) v4.0.12
CCM
5 controls
Cyber Risk Institute Profile (CRI)
CRI_PROFILE
5 controls
AWS Foundational Technical Review (FTR) Validation Checklist
AWS_FTR
4 controls
FedRAMP Security Controls Baseline (High) - NIST SP 800-53 Rev. 5
FEDRAMP_REV5_HIGH_BASELINE
4 controls
FedRAMP Security Controls Baseline (Low) - NIST SP 800-53 Rev. 5
FEDRAMP_REV5_LOW_BASELINE
4 controls
FedRAMP Security Controls Baseline (Moderate) - NIST SP 800-53 Rev. 5
FEDRAMP_REV5_MODERATE_BASELINE
4 controls
FedRAMP 20x (Phase 2 Pilot) Requirements, Recommendations, and KSIs
FEDRAMP20X
4 controls
OWASP Application Security Verification Standard (ASVS)
OWASP_ASVS_5_0_0
4 controls
SOC 2
SOC2
4 controls
StateRAMP / GovRAMP Baseline Controls for Authorization (Authorized Low & Moderate) --- StateRAMP Authorized Baseline Requirements (Aligned to NIST SP 800-53 Rev. 5)
STATERAMP
4 controls
Amazon Web Services (AWS) Integration Questions
Does this require admin access?
Does this require admin access?
It depends on the evidence you choose to capture. We'll confirm required permissions during setup.
Can we control cadence?
Can we control cadence?
Yes. In eligible plans, cadence is configurable.
Can we export evidence if a reviewer asks?
Can we export evidence if a reviewer asks?
Yes, when needed. You can export evidence bundles for offline attachments, or share a controlled reviewer view through Trust Center. Aurora keeps the source and timestamps so the work stays reusable between reviews.
Want to Confirm Evidence Coverage for Amazon Web Services (AWS)?
Bring one reviewer request. We'll map what can be automated, what stays manual, and how to share it in a controlled way.
No obligation. We respond within one business day. No compliance guarantees.