Security Audits
Use Cloudeval to Conduct Comprehensive Security Audits of Your Infrastructure Cloudeval helps security teams and DevOps engineers quickly visualize and audit infrastructure code to identify security vulnerabilities, compliance gaps, and best practice violations before deployment.Use Case Overview
Who: Security teams, DevOps engineers, compliance officers When:- Before deploying new infrastructure
- During security reviews
- For compliance audits
- After security incidents
- Regular security assessments
Workflow
Step 1: Upload Infrastructure as Code
- Upload ARM template or Bicep file to Cloudeval
- Review parsed resources - Ensure all resources are detected
- Verify template structure - Check for parsing errors
Step 2: Run Security Analysis
- Open Security Analysis panel
- Review automatic findings - Cloudeval scans for:
- Publicly accessible resources
- Missing encryption
- Inadequate access controls
- Network security gaps
- Compliance violations
- Categorize issues by severity (Critical, High, Medium, Low)
Step 3: Visualize Security Posture
- View diagram with security annotations
- Identify vulnerable resources highlighted in diagram
- Understand relationships - See how resources connect
- Map attack surfaces - Visualize potential entry points
Step 4: Investigate Issues
- Click on security warnings to see details
- Review recommendations for each issue
- Understand impact - See affected resources
- Prioritize fixes - Focus on critical issues first
Step 5: Fix and Verify
- Edit code in the web editor
- Apply security fixes based on recommendations
- Re-analyze to verify fixes
- Document changes - Note security improvements
Step 6: Generate Audit Report
- Export Security Report (PDF, JSON, CSV)
- Include findings with severity and recommendations
- Share with stakeholders - Security team, management
- Track remediation - Follow up on fixes
Common Security Checks
Public Access Audits
Check for:- Storage accounts with public blob access
- Databases with public endpoints
- Load balancers exposed to internet
- App Services with public access
- Key Vaults with public network access
Encryption Audits
Check for:- Unencrypted storage accounts
- Databases without encryption at rest
- Missing encryption for data transfers
- Unencrypted backup storage
Access Control Audits
Check for:- Overly permissive IAM roles
- Missing least-privilege principles
- Public contributor access
- Unrestricted network access
Network Security Audits
Check for:- Overly permissive NSG rules
- Missing network isolation
- Public endpoints without restrictions
- Insecure network configurations
Compliance Audits
Check against:- Azure Security Benchmark
- CIS Azure Foundations Benchmark
- NIST Cybersecurity Framework
- PCI DSS (when applicable)
- HIPAA (when applicable)
Best Practices
Regular Audits
- Before Deployment - Always audit before deploying to production
- Scheduled Reviews - Conduct monthly or quarterly audits
- After Changes - Re-audit after significant infrastructure changes
- Incident Response - Audit after security incidents
Prioritization
Focus on:- Critical Issues - Fix immediately (encryption, public access)
- High Issues - Address before deployment (access controls)
- Medium Issues - Plan fixes (compliance, best practices)
- Low Issues - Consider improvements (optimization)
Documentation
- Document Findings - Keep audit reports for compliance
- Track Remediation - Follow up on fixes
- Share Results - Communicate findings to stakeholders
- Learn from Issues - Update processes to prevent recurrence
Example Audit Scenario
Scenario: Pre-Production Security Review
Context: New infrastructure being deployed to production Steps:- Upload production template to Cloudeval
-
Run security analysis - Identifies 12 issues:
- 2 Critical (missing encryption)
- 5 High (public access, permissive roles)
- 4 Medium (compliance gaps)
- 1 Low (optimization)
- Review findings with security team
- Prioritize fixes - Address critical and high issues
- Fix in code - Apply security improvements
- Re-analyze - Verify all critical/high issues resolved
- Generate report - Document audit and fixes
- Deploy - Proceed with deployment after fixes
Integration with CI/CD
Automated Security Checks
Integrate Cloudeval security analysis into CI/CD:Pre-Deployment Gates
- Block deployment if critical issues found
- Warn on high issues - Require approval
- Report medium/low - Log for review
- Track over time - Monitor security trends
Next Steps
- Security Analysis Feature - Learn about security features
- Export & Share - Share audit reports
- Getting Started - Learn the basics
- Infrastructure Onboarding - Related use case
Ready to audit your infrastructure? Try Cloudeval now
