
Citadel Cloud Management
Multi-Cloud Security Posture Management
Cybersecurity FrameworksCreated by Kenny Ogunlowo
Product Description
Cloud Security Posture Management Framework — Multi-Cloud Governance Toolkit
After securing multi-cloud environments at organizations where a single misconfigured S3 bucket or overly permissive IAM role could expose regulated data, I built this framework because cloud breaches are almost never zero-days — they're misconfigurations that nobody caught because the CSPM tool generated 12,000 findings and the security team triaged 200.
The core gap: CIS Benchmarks for AWS have 107 recommendations, Azure has 195, and GCP has 133. CSA Cloud Controls Matrix v4 has 197 controls across 17 domains. Running all of these as automated checks produces noise that buries the 15 findings that actually represent exploitable risk in your environment.
What You Get
- Prioritized CIS Benchmark Implementations — Terraform modules for the top 40 highest-risk CIS controls across AWS, Azure, and GCP. Covers: IAM (no root access keys, MFA enforcement, least-privilege policies), networking (security groups, NACLs, VPC flow logs), encryption (KMS key rotation, storage encryption defaults), and logging (CloudTrail, Azure Monitor, GCP Audit Logs).
- CSA CCM v4 Control Mapping — All 17 domains mapped to specific cloud service configurations. Includes Shared Responsibility Model clarity for IaaS, PaaS, and SaaS — what the provider covers vs. what you must configure yourself.
- Infrastructure-as-Code Security Policies — OPA (Open Policy Agent) Rego policies and Sentinel policies for Terraform Cloud that prevent insecure configurations from being deployed. Covers: public storage buckets, unencrypted databases, overly permissive security groups, and missing logging configurations.
- Multi-Cloud Identity Governance — Cross-cloud privilege analysis templates, service account audit procedures, and least-privilege policy generators for AWS IAM, Azure RBAC, and GCP IAM. Includes detection rules for privilege escalation techniques (iam:PassRole abuse, Azure PIM manipulation, GCP setIamPolicy).
- Cloud-Native Detection Rules — 50 detection rules for cloud-specific attack techniques: credential harvesting from metadata services (IMDSv1), cross-account role assumption, storage exfiltration patterns, and cryptomining detection via compute anomalies.
Brownfield Implementation
Week 1-2: Deploy read-only CSPM scanning across all cloud accounts and subscriptions. Week 3-4: Triage findings using the included risk-prioritization framework — focus on internet-exposed resources and identity misconfigurations first. Week 5-8: Remediate critical findings and deploy IaC guardrails to prevent recurrence. Week 9-12: Implement continuous monitoring with automated alerting for drift detection.
Scope Limitations
Covers AWS, Azure, and GCP IaaS and PaaS security posture. Does not cover SaaS security posture management (SSPM), container runtime security (covered in separate framework), serverless-specific security patterns, or cloud cost optimization. Assumes Terraform or similar IaC is used for infrastructure deployment.
Audit Evidence
Satisfies CSA CCM v4 audit requirements, NIST SP 800-53 CM-6 (Configuration Settings), AC-6 (Least Privilege), and SC-7 (Boundary Protection). Generates: cloud configuration assessment reports with CIS Benchmark scoring, IAM privilege analysis reports, encryption-at-rest validation, network segmentation evidence, and continuous monitoring dashboards required for FedRAMP, SOC 2, and ISO 27001 cloud security evidence.
Written by Kenny Ogunlowo — Detection Engineer, U.S. Secret Clearance holder. Secured multi-cloud environments at Lockheed Martin and healthcare organizations processing ePHI.