Supported Cloud Providers
AWS
Amazon Web Services including Security Hub, Config, CloudTrail, IAM, GuardDuty, Inspector, and ECR.
Azure
Microsoft Azure including Defender for Cloud, Entra ID (Azure AD), DevOps, Container Registry, and Gov Cloud.
Google Cloud
Google Cloud Platform including Security Center, Cloud Asset API, Container Registry, and Cloud Storage.
AWS Integration
AWS is connected using an IAM role or API access keys. LowerPlane reads data from multiple AWS services to build a comprehensive security picture.Services Monitored
| AWS Service | What LowerPlane Collects |
|---|---|
| Security Hub | Aggregated security findings across all enabled standards |
| AWS Config | Resource configuration history and compliance evaluations |
| CloudTrail | API activity logs for audit trail evidence |
| IAM | Users, roles, policies, MFA status, access key rotation |
| GuardDuty | Threat detection findings and anomalous activity |
| Inspector | Vulnerability findings for EC2 instances and container images |
| ECR | Container image scan results |
Evidence Collected
- IAM password policy configuration
- MFA enforcement status for all IAM users
- S3 bucket encryption and public access settings
- CloudTrail logging enabled across all regions
- VPC flow log configuration
- Security group rules and network ACLs
- Root account usage and access key status
Azure Integration
Azure connects through an App Registration (service principal) with read-only permissions across your subscription.Services Monitored
| Azure Service | What LowerPlane Collects |
|---|---|
| Defender for Cloud | Security recommendations and secure score |
| Entra ID (Azure AD) | Users, groups, MFA status, conditional access policies |
| Activity Log | Administrative and security event audit trails |
| Network Watcher | Network security group rules and flow logs |
| Key Vault | Key and secret management configuration |
Evidence Collected
- Conditional access policy configurations
- MFA registration and enforcement status
- Network security group rules
- Storage account encryption settings
- Azure Policy compliance state
- Diagnostic logging configuration
If your organization uses both Azure AD for identity and Azure for infrastructure, you may need two separate connections: one for the identity provider (Entra ID) and one for the cloud subscription.
Google Cloud Integration
GCP connects using a service account with read-only IAM roles.Services Monitored
| GCP Service | What LowerPlane Collects |
|---|---|
| Security Command Center | Security findings and vulnerability reports |
| Cloud Asset Inventory | Complete resource inventory across all projects |
| IAM | Service accounts, roles, and policy bindings |
| Cloud Logging | Audit log configuration and export settings |
Evidence Collected
- Organization policy constraints
- VPC firewall rules
- Cloud Storage bucket IAM and encryption settings
- Service account key rotation status
- Audit log sink configuration
- Binary authorization policies for GKE
What Controls Are Covered
Cloud provider integrations contribute evidence to controls across all 50+ frameworks:| Framework | Example Controls |
|---|---|
| ISO 27001 | A.8.1 (Asset management), A.10.1 (Cryptographic controls), A.13.1 (Network security) |
| SOC 2 | CC6.1 (Logical access), CC6.6 (External threats), CC7.1 (Monitoring) |
| HIPAA | Access controls (164.312), Audit controls (164.312(b)), Encryption (164.312(e)) |
| GDPR | Article 32 (Security of processing), Article 25 (Data protection by design) |
| PCI-DSS | Req 1 (Firewall), Req 3 (Stored data), Req 7 (Access restriction), Req 10 (Logging) |
Automated Tests
When a cloud provider is connected, LowerPlane automatically creates and runs tests such as:- MFA is enabled for all IAM users with console access
- Encryption at rest is enabled for all storage resources
- Logging is enabled across all regions and services
- No storage buckets or blobs are publicly accessible
- Root/owner account access keys are disabled or rotated
- Network security groups do not allow unrestricted inbound access
- API activity logging captures all management events
Connection Requirements
| Provider | Auth Method | Minimum Permissions |
|---|---|---|
| AWS | IAM Role (cross-account) or Access Keys | SecurityAudit managed policy, ReadOnlyAccess to Security Hub and Config |
| Azure | App Registration (Service Principal) | Reader role on subscription, Directory.Read.All for Entra ID |
| GCP | Service Account JSON Key | roles/viewer on project, roles/securitycenter.findingsViewer |
LowerPlane operates in read-only mode. It never creates, modifies, or deletes resources in your cloud accounts. The permissions listed above are sufficient for full evidence collection.
Multi-Account and Multi-Region
For organizations with multiple cloud accounts or regions:- AWS: Connect each account individually, or use an organization-level IAM role with
sts:AssumeRolepermissions for member accounts. - Azure: Connect each subscription. A single App Registration can be granted access across multiple subscriptions.
- GCP: Connect each project, or grant the service account access at the organization or folder level.