Compliance Enforcement
Architecture
Enforce compliance requirements through tagging policies:
- DataClassification tag for data sensitivity levels
- Compliance tag for regulatory framework mapping
- AWS Organizations tag policies for enforcement
- AWS Config rules for compliance monitoring
When to Use
This pattern is ideal when you need:
- SOC2, HIPAA, PCI-DSS, or GDPR compliance
- Data classification enforcement
- Audit trail requirements
- Security control documentation
- Regulatory reporting
Implementation
module "compliance_tags" {
source = "registry.patterneddesigns.ca/standardnat/tagging-policy/aws"
version = "1.1.0"
required_tags = [
"DataClassification",
"Compliance",
"Owner",
"Environment"
]
tag_values = {
DataClassification = [
"public",
"internal",
"confidential",
"restricted"
]
Compliance = [
"soc2",
"hipaa",
"pci-dss",
"gdpr",
"none"
]
}
default_tags = {
ManagedBy = "terraform"
Auditable = "true"
}
enforce_lowercase = true
}
# Export validation rules for AWS Organizations
output "tag_policy_rules" {
value = module.compliance_tags.validation_rules
}
Considerations
- Coordinate with compliance and security teams
- Document tag value definitions
- Implement AWS Config rules for monitoring
- Regular compliance audits using tag-based queries
- Consider automation for tag remediation