Module 25: Auditability, Traceability, and Accountability
The exam treats auditability as non-negotiable. If you cannot prove what happened to data — who accessed it, when, from where, and what they did — your security controls are unverifiable. Auditability turns security from a claim into evidence.
Auditability in Cloud
Auditability is the ability to demonstrate, through verifiable records, that security controls are operating effectively and that data is being handled according to policy. In cloud environments, auditability depends on comprehensive logging, immutable log storage, and the ability to correlate events across distributed services.
Cloud Audit Logs
Cloud providers offer audit logging for their services (AWS CloudTrail, Azure Activity Log, GCP Cloud Audit Logs). These logs record API calls, configuration changes, and access events. The exam expects you to know that:
- Cloud audit logs should be enabled for all services, not just a subset
- Logs should be stored in a separate, restricted account to prevent tampering by compromised administrators
- Log retention must match compliance requirements (often 1-7 years depending on regulation)
- Logs should be immutable — once written, they cannot be modified or deleted
Traceability
Traceability is the ability to follow a data element through its entire lifecycle — from creation through every access, modification, transfer, and eventually destruction. In cloud, traceability requires correlating events across multiple services, regions, and potentially providers.
Implementing Traceability
- Correlation IDs: Unique identifiers that track a transaction or data element across distributed services.
- Centralized logging: Aggregating logs from all cloud services into a single SIEM or log analytics platform.
- Data lineage tools: Tracking where data originated, how it was transformed, and where it has been stored or transmitted.
- Timestamps and sequencing: Accurate time synchronization (NTP) across all systems to establish event order.
Exam insight: If a question describes logs scattered across multiple cloud services with no centralization, the correct answer usually involves implementing centralized logging and correlation. Distributed logs without correlation provide evidence but not traceability.
Accountability
Accountability ensures that every action can be attributed to a specific identity. This requires:
- Individual accounts: No shared accounts. Every action must trace to a specific person.
- Non-repudiation: The ability to prove that a specific identity performed a specific action, in a way the identity cannot deny.
- Least privilege: Excessive permissions undermine accountability because too many people could have performed the action.
- Session management: Tracking who was authenticated during a session and what they did.
Shared Accounts and Accountability Failure
The exam frequently tests shared account scenarios. If five administrators share a root account and a destructive action occurs, you cannot determine who did it. This is an accountability failure. The correct answer is individual accounts with role-based access, not shared credentials.
Cloud-Specific Challenges
- Multi-cloud correlation: Events spanning multiple cloud providers require standardized log formats and centralized analysis.
- Serverless and ephemeral workloads: Short-lived compute instances may not persist logs locally. Logs must be forwarded in real-time.
- CSP transparency: The customer may not have visibility into the provider's internal operations. SLAs should address provider-side logging and audit access.
Key Takeaways
Enable comprehensive logging on all cloud services. Store logs immutably in a separate restricted account. Centralize logs for correlation and traceability. Ensure individual accounts for accountability. Eliminate shared credentials. Implement non-repudiation through digital signatures and audit trails. Address multi-cloud and ephemeral workload logging challenges proactively.