Skip to main content

What Cloud Tests do

Cloud Tests connect your cloud accounts to Comp AI and continuously evaluate them against security and compliance controls. Each finding is mapped to the frameworks you track (SOC 2, ISO 27001, CIS, PCI DSS, HIPAA), so cloud misconfigurations show up directly in your compliance posture. All connections are read-only by default. Comp AI only makes GET / list calls against each cloud provider unless you explicitly opt in to auto-remediation (AWS).

Supported providers

AWS

Cross-account IAM role with External ID. No access keys stored.

Azure

Sign in with Microsoft OAuth, or provision a service principal.

GCP

Sign in with Google OAuth. Findings flow from Security Command Center.

How connections are authorized

ProviderConnection methodWhat you provide
AWSCross-account IAM role (STS AssumeRole)Role ARN + External ID (pre-filled in the UI)
AzureOAuth 2.0 (primary) or service principalMicrosoft sign-in, or Tenant + Client ID + Secret + Sub ID
GCPOAuth 2.0Google sign-in; org + projects auto-detected after consent

Common capabilities

Regardless of provider, each connection supports:
  • Continuous scanning on a schedule, with on-demand re-scans
  • Per-service toggles so you can enable only the checks you care about
  • Findings mapped to frameworks (SOC 2, ISO 27001, CIS, PCI DSS, HIPAA)
  • Evidence collection that plugs directly into the compliance module
  • Multiple connections per provider so you can monitor multiple accounts, subscriptions, or orgs separately

Next steps