Many companies treat
SOC 2andHIPAAas documentation projects. In practice, both depend on operational security controls, and those controls are weak if you cannot see risky cloud activity as it happens.
Compliance requirements are really security requirements
Teams usually start thinking seriously about SOC 2 or HIPAA when a customer asks for it, procurement blocks a deal, or the company begins handling more sensitive data.
That is normal. The mistake is assuming these frameworks are mostly about policies and paperwork.
They are not.
Both SOC 2 and HIPAA depend on real technical and operational controls:
- Access control
- Logging and monitoring
- Incident detection and response
- Change management
- Evidence retention
- Risk management
If those controls exist only on paper, audits get painful and real security risk stays high.
The short version
If you only remember three points from this article, make them these:
| Point | Why it matters |
|---|---|
SOC 2 and HIPAA both require operational security |
Policies help, but auditors also expect controls that actually work |
CloudTrail is key evidence in AWS environments |
It records who changed what, from where, and when |
Alerts matter as much as logs |
Storing audit data is not enough if nobody sees risky changes in time |
SOC 2 and HIPAA are different, but they overlap heavily
SOC 2 is an attestation framework based on the Trust Services Criteria. Most companies focus first on the Security criteria, and sometimes add Availability or Confidentiality depending on the business.
HIPAA is a regulatory framework for protecting electronic protected health information, or ePHI. The HIPAA Security Rule is built around administrative, physical, and technical safeguards.
They are not the same thing, but in cloud environments they often lead to similar security expectations.
| Area | SOC 2 focus | HIPAA focus | Practical outcome |
|---|---|---|---|
| Access control | Restrict access to systems and data | Limit access to ePHI |
Review admin access, use least privilege, require MFA |
| Audit logging | Evidence that security controls operate effectively | Audit controls for system activity | Retain logs and review privileged changes |
| Monitoring | Detect unauthorized or risky behavior | Identify suspicious access to regulated systems | Create alerts for high-risk events |
| Incident response | Defined and repeatable response process | Security incident procedures | Triage, document, contain, and report incidents |
| Change management | Controlled changes to production systems | Protect system integrity | Monitor risky cloud changes and privileged actions |
For AWS-heavy companies, CloudTrail becomes one of the most important sources of evidence for all five areas.
What auditors and customers usually want to see
Neither SOC 2 nor HIPAA says “you must buy this exact product.” That is not how compliance works.
What auditors, assessors, and customer security teams usually want to see is that you can answer questions like:
- Who has privileged access?
- How do you know when that access changes?
- How do you detect suspicious or unauthorized actions?
- How long do you keep logs?
- What happens when a risky event occurs?
- Can you show evidence that monitoring is active and reviewed?
This is where many teams struggle. They may have CloudTrail enabled, but they do not have meaningful alerting, review workflows, or retained evidence that shows the control is operating.
Why CloudTrail matters so much for SOC 2 and HIPAA
In AWS, CloudTrail is your control plane audit log. It captures management activity across IAM, S3, EC2, CloudTrail itself, and many other services.
That gives you three things that matter directly for compliance:
-
Evidence You can show that privileged actions and configuration changes were logged.
-
Detection You can identify high-risk events such as logging tampering, privilege escalation, and public exposure changes.
-
Investigation You can reconstruct who made a change, from which identity, IP address, and region.
Without that visibility, your compliance story is weak. You may still pass some checks with screenshots and policies, but your actual security posture will lag behind your documentation.
Logging alone is not enough
A common failure mode looks like this:
CloudTrail is enabled
-> logs are stored somewhere
-> nobody reviews high-risk events
-> no alert fires on dangerous changes
-> incidents are discovered late
This satisfies the spirit of neither SOC 2 nor HIPAA.
For both frameworks, the stronger position is:
Audit logs are collected
-> risky events are detected
-> alerts are reviewed
-> incidents are documented
-> evidence is retained
That is a real control, not only a checkbox.
The CloudTrail events you should alert on first
If your company is budget-constrained, do not start with hundreds of rules. Start with the events that matter most for privilege, logging integrity, and public exposure.
1. Logging tampering
These are high-priority events because they reduce your visibility:
StopLoggingDeleteTrailUpdateTrailPutEventSelectors
If someone changes your logging configuration, you want to know immediately.
2. IAM privilege escalation
These are high-value alert candidates because they can quickly turn a limited compromise into broad control:
AttachRolePolicyAttachUserPolicyAttachGroupPolicyPutRolePolicyPutUserPolicyCreatePolicyVersion
Especially when the request contains AdministratorAccess, wildcard actions, or wildcard resources.
3. Sensitive access and persistence
These events often indicate durable access creation:
CreateAccessKeyUpdateAssumeRolePolicy- Cross-account snapshot or AMI sharing events
4. Public exposure changes
These often matter for both security and compliance:
PutBucketAclPutBucketPolicyDeletePublicAccessBlockAuthorizeSecurityGroupIngress
5. Root account activity
Any API activity from the root account should be investigated. It is one of the cleanest high-signal alerts in AWS.
Recommended alerting priorities
Here is a practical starting point for a compliance-focused AWS environment:
| Priority | Event type | Why it matters for compliance |
|---|---|---|
P1 |
CloudTrail disablement or tampering | Protects the integrity of your audit evidence |
P1 |
IAM privilege escalation | Detects unauthorized expansion of access |
P1 |
Root account activity | High-risk privileged activity with low expected volume |
P2 |
S3 public exposure changes | Helps protect sensitive or regulated data |
P2 |
Access key creation | Detects creation of durable credentials |
P2 |
Security group internet exposure | Flags risky changes that may expose workloads |
P3 |
Unusual region activity | Useful for spotting abnormal control plane behavior |
Example: what a compliance-relevant audit event looks like
An alert-worthy AWS management event often looks like this:
{
"eventSource": "cloudtrail.amazonaws.com",
"eventName": "StopLogging",
"userIdentity": {
"type": "IAMUser",
"arn": "arn:aws:iam::123456789012:user/platform-admin"
},
"awsRegion": "us-east-1",
"sourceIPAddress": "198.51.100.20",
"requestParameters": {
"name": "org-trail"
}
}
This is valuable for two reasons:
- It is a potential security incident
- It is also evidence that your monitoring control worked, if your team reviewed and documented the alert
That second point matters a lot during audits.
What are the product alternatives?
Most companies end up choosing one of four paths.
Option 1: Manual compliance plus native AWS tooling
This usually means some mix of CloudTrail, CloudWatch, Security Hub, spreadsheets, ticketing, and manual review.
Pros:
- Low initial cost
- Uses native AWS services
- Good for very small environments
Cons:
- Hard to maintain as the company grows
- Easy to miss high-risk events
- Evidence collection becomes manual and inconsistent
- Alert tuning and review still take real time
Option 2: Enterprise CNAPP or compliance platform
Examples include broad cloud security platforms and compliance automation suites.
Pros:
- Wide feature coverage
- Strong dashboards and reporting
- Useful for large environments with dedicated teams
Cons:
- Often expensive for startups and mid-sized teams
- More platform than many companies actually need
- Still requires internal ownership for triage and response
Option 3: DIY SIEM pipeline
This means sending CloudTrail and other logs into a Security Information and Event Management (SIEM) platform, then writing and maintaining your own alert rules.
Pros:
- Flexible
- Can be cost-effective if you already have strong in-house expertise
- Full control over detections and retention
Cons:
- Engineering-heavy
- Requires ongoing tuning
- Evidence and incident workflows still need to be built
- Easy to under-resource
Option 4: Managed monitoring and alerting
This is where Xpernix fits.
Instead of expecting a small team to design, tune, review, and document cloud compliance monitoring on its own, Xpernix provides a managed path:
- Ingest
CloudTrailand other key log sources - Normalize and retain the relevant events
- Run curated alert rules for high-risk cloud actions
- Review and triage alerts through an operational workflow
- Help teams build evidence that the monitoring control actually operates
Comparing the approaches
| Approach | Best for | Main downside |
|---|---|---|
| Native AWS tools only | Very small teams with time to operate everything manually | Weak triage and evidence workflows at scale |
| Enterprise CNAPP or compliance suite | Larger organizations with bigger budgets | Often expensive and operationally heavy |
| DIY SIEM | Teams with strong detection engineering capability | High ownership cost |
| Xpernix managed approach | Startups and mid-sized companies that need practical coverage fast | More focused than a broad enterprise platform |
Why Xpernix is a good fit for budget-constrained teams
Many companies do not need the largest possible compliance stack. They need a security program that can actually run every day.
That usually means:
- Logs from the right systems
- Alerts on the right cloud events
- Human review of the alerts that matter
- Retention and evidence that support audits and customer reviews
Xpernix is designed around that reality.
For companies pursuing SOC 2, supporting HIPAA, or both, we help create a practical compliance monitoring layer without forcing a small team to buy a large enterprise platform and then figure out how to operate it alone.
A realistic baseline for AWS compliance monitoring
For many startups and mid-sized companies, a workable baseline looks like this:
compliance_monitoring:
log_sources:
- aws_cloudtrail
- identity_provider
- endpoint_or_edr
alerts:
- cloudtrail_tampering
- iam_privilege_escalation
- root_activity
- s3_public_exposure
- access_key_creation
outcomes:
- alert_review
- incident_documentation
- retained_audit_evidence
That is much more defensible than simply saying “we enabled logging.”
Final thought
SOC 2 and HIPAA both require more than policy documents. They require security controls that can detect, record, and support response to risky activity.
In AWS environments, CloudTrail is one of the most important foundations for that work. But the real value appears when you turn raw audit logs into alerts, review, and evidence.
If you want to see how Xpernix can help you build a cost-effective monitoring layer for SOC 2 and HIPAA, contact us.