Cloud Security Policy
ISO 27001 Control A.5.23 — Effective: March 8, 2026
Document ID: H33-CSP-001
Classification: Internal / Auditor-Accessible
Owner: Eric Beans, CEO / CISO
Approved: March 8, 2026
Next Review: March 2027
1. Purpose
This policy establishes the requirements for the secure use of cloud services at H33, in accordance with ISO 27001:2022 control A.5.23 (Information security for use of cloud services). It defines the security controls, responsibilities, and monitoring requirements for H33's cloud infrastructure.
All H33 personnel, contractors, and third parties with access to H33 cloud resources must comply with this policy.
2. Cloud Provider
H33's production infrastructure is hosted on Amazon Web Services (AWS) in the us-east-1 region (Northern Virginia). AWS maintains the following certifications relevant to H33's compliance posture:
- SOC 2 Type II — Annual audit of security, availability, and confidentiality controls
- ISO 27001:2022 — Certified information security management system
- ISO 27017 — Cloud-specific information security controls
- ISO 27018 — Protection of personally identifiable information in public clouds
- HIPAA — BAA available; eligible services configured per AWS HIPAA guidance
- FedRAMP High — US government authorization for high-impact workloads
H33 operates under the AWS Shared Responsibility Model: AWS secures the infrastructure (physical, network, hypervisor), and H33 secures the configuration, data, identity, and application layers.
3. Architecture
The following diagram illustrates H33's production cloud architecture:
3.1 Key Architecture Decisions
- All data stores reside in private subnets with no public IP addresses
- The Application Load Balancer is the sole internet-facing endpoint
- CloudFront provides edge caching, DDoS mitigation, and TLS termination
- Elastic Beanstalk manages deployment, scaling, and health monitoring
- No SSH/RDP access to production instances from the public internet
4. Network Security
4.1 VPC Configuration
- CIDR:
10.0.0.0/16(65,536 addresses) - Public subnets: ALB endpoints only, across 2+ availability zones
- Private subnets: EC2 instances, RDS, ElastiCache, across 2+ availability zones
- NAT Gateway: Private subnet outbound internet access (patch downloads, external API calls)
4.2 Security Groups
| Resource | Inbound Rule | Source |
|---|---|---|
| ALB | TCP 443 (HTTPS) | 0.0.0.0/0 (via CloudFront) |
| EC2 App Server | TCP 443 (HTTPS) | ALB Security Group only |
| RDS PostgreSQL | TCP 5432 | App Security Group only |
| ElastiCache Redis | TCP 6379 | App Security Group only |
4.3 Network ACLs
- Default deny on all private subnets
- Explicit allow rules for required traffic only
- No public SSH (port 22) or RDP (port 3389) access from any source
5. Data Protection
5.1 Encryption at Rest
| Service | Encryption Method | Key Management |
|---|---|---|
| EBS Volumes | AES-256 (default encryption enabled) | AWS-managed KMS key |
| RDS PostgreSQL | AES-256 (storage encryption) | AWS-managed KMS key |
| ElastiCache Redis | AES-256 (at-rest encryption) | AWS-managed KMS key |
| S3 Buckets | SSE-S3 (AES-256) | S3-managed keys |
| CloudTrail Logs | SSE-S3 (AES-256) | S3-managed keys |
5.2 Encryption in Transit
- TLS 1.2 or higher required for all external connections
- CloudFront enforces HTTPS-only (HTTP redirected to HTTPS)
- ALB configured with AWS TLS 1.2+ security policy
- RDS connections require SSL/TLS (
rds.force_ssl = 1) - ElastiCache in-transit encryption enabled
- Internal VPC traffic encrypted where supported by AWS service
5.3 Application-Layer Encryption
Beyond infrastructure-level encryption, H33's cryptographic engine provides additional protection:
- FHE (BFV/CKKS): Data processed without decryption — server never sees plaintext biometric templates or sensitive fields
- Dilithium (ML-DSA): Post-quantum digital signatures for attestation and document validation
- Kyber (ML-KEM): Post-quantum key encapsulation for secure key exchange
- SPHINCS+ (SLH-DSA): Stateless hash-based signatures for long-term verification
- SHA3-256: Post-quantum secure hashing for integrity verification
6. Identity and Access Management
6.1 IAM Principles
- Least Privilege: All IAM policies grant minimum required permissions
- MFA Required: Multi-factor authentication mandatory for all AWS console access
- Root Account: Secured with hardware MFA, never used for daily operations, access keys deleted
- Group-Based Policies: Permissions assigned via IAM groups, not individual users
- Service Roles: EC2 instances and Lambda functions use IAM roles (no long-lived credentials)
6.2 Access Key Management
- Access keys rotated every 90 days maximum
- Unused access keys deactivated after 30 days of inactivity
- Access key usage audited via CloudTrail and IAM Credential Report
- Programmatic access uses IAM roles where possible (preferred over access keys)
7. Logging and Monitoring
7.1 CloudTrail
- Enabled in all AWS regions (not limited to us-east-1)
- Management events: all read/write API calls logged
- S3 data events: read/write operations on sensitive buckets
- Log file integrity validation enabled
- Logs delivered to dedicated S3 bucket with versioning and MFA-delete protection
7.2 CloudWatch
- Custom metrics for application-level monitoring (request latency, error rates, auth success/failure)
- Alarm thresholds for CPU, memory, disk, network anomalies
- Dashboard for real-time operational visibility
- Log groups with defined retention periods (90 days minimum)
7.3 Drata Continuous Monitoring
- 100+ automated control checks across AWS infrastructure
- Continuous evidence collection for SOC 2 and ISO 27001 controls
- Automated alerts for control drift or compliance gaps
- Integration with AWS, GitLab, and identity providers
8. Incident Response
Cloud security incidents follow the H33 Incident Response procedure. The notification chain for cloud-specific events is:
- Detection: CloudWatch alarm or Drata alert triggers
- Notification: SNS topic delivers alert to email and Slack (#security-incidents)
- Triage: Security Officer assesses severity within defined SLAs (see Security Event Reporting Procedure)
- Containment: Isolate affected resources (Security Group modification, instance stop, key revocation)
- Investigation: CloudTrail log analysis, VPC flow log review, application log forensics
- Recovery: Restore from known-good state, patch vulnerability, verify integrity
- Post-Incident: Root cause analysis, lessons learned, control updates
9. Shared Responsibility Matrix
| Control Area | AWS Responsibility | H33 Responsibility |
|---|---|---|
| Physical Security | Data center access, environmental controls | N/A (no on-premises) |
| Network Infrastructure | Global network, DDoS baseline protection | VPC design, security groups, NACLs |
| Compute | Hypervisor, host OS patching | Guest OS patching, application updates |
| Storage Encryption | Encryption mechanism (SSE, KMS) | Enabling encryption, key policy configuration |
| Identity | IAM service availability | IAM policy design, MFA enforcement, key rotation |
| Logging | CloudTrail/CloudWatch service availability | Enabling logging, retention, alert configuration |
| Application Security | N/A | Secure coding, vulnerability scanning, pen testing |
| Data Classification | N/A | Data classification, handling, and access controls |
10. Review
This Cloud Security Policy is reviewed annually by the CEO/CISO, or more frequently when there are significant changes to H33's cloud architecture, provider certifications, or the threat landscape.
| Version | Date | Author | Change Description |
|---|---|---|---|
| 1.0 | March 8, 2026 | Eric Beans | Initial cloud security policy |
Next scheduled review: March 2027
Questions about this policy?
Contact our Security team at security@h33.ai