Compliance Automation Engine
Compliance in the cloud is not a checkbox exercise — it is a continuous process that must keep pace with the speed of infrastructure changes. Manual compliance audits are expensive, slow, and outdated the moment they are published. In this challenge, you will design an automated compliance engine on AWS that continuously evaluates infrastructure against security standards (CIS AWS Foundations Benchmark, SOC 2, HIPAA), automatically remediates violations, and generates audit-ready evidence. The evaluation layer uses AWS Config rules — both managed rules for common checks (S3 bucket encryption, CloudTrail enabled, root account MFA) and custom rules implemented as Lambda functions for organization-specific policies. Config rules evaluate both on configuration change (immediately when a resource is modified) and on a periodic schedule for drift detection. AWS Security Hub aggregates findings from Config, GuardDuty, Inspector, and IAM Access Analyzer into a single compliance dashboard with severity scoring. The auto-remediation layer uses Config rules' automatic remediation with SSM Automation documents: non-compliant S3 buckets are automatically encrypted, security groups with 0.0.0.0/0 on SSH are automatically restricted, and IAM users without MFA receive automated notification with a 48-hour deadline before access restriction. For remediations that cannot be fully automated (they require human judgment), the engine creates tickets in an SQS queue consumed by a ticketing system integration, with escalation timers. The evidence collection pipeline uses CloudTrail for API-level audit trails, Config snapshots for point-in-time infrastructure state, and custom Lambda functions that take screenshots of security configurations and store them in an S3 evidence bucket with object lock for immutability. Compliance reports are generated automatically using Lambda functions that query Config, Security Hub, and the evidence bucket, producing PDF reports (stored in S3) formatted to match specific audit framework requirements. The engine supports multi-account governance using AWS Organizations with delegated administrator for Config and Security Hub, aggregating compliance data from all accounts into a central management account. Service Control Policies at the organization level provide preventive guardrails that supplement the detective controls. This challenge teaches compliance automation architecture, security governance at scale, and the AWS services that enable continuous compliance for regulated industries.
AWS Services You'll Use
Challenge Details
- Path
- Security & Resilience
- Difficulty
- Advanced
- Duration
- 70 min
- Plan
- Pro
Architecture Patterns You'll Learn
Why This Challenge?
Unlike whiteboard exercises or multiple-choice quizzes, this challenge requires you to design a real architecture with actual AWS services, evaluate trade-offs, and defend your decisions. Our automated validators check your design against production-grade criteria. Complete it and it shows up in your verified portfolio with your architecture diagram and design rationale.
More from Security & Resilience
Zero-Trust Network Architecture
Design a zero-trust network where every request is authenticated and authorized regardless of network location.
Advanced · 70 minCascading Failure Prevention
Design resilience patterns that prevent a single service failure from cascading across your entire system.
Advanced · 75 minSecrets Management Pipeline
Design an enterprise secrets management system with automatic rotation, zero-knowledge access, and audit trails.
Advanced · 65 minReady to design this for real?
Get the full scenario, design your architecture using real AWS services, and validate against production-grade criteria. Your completed challenge shows up in your verified portfolio.
Start Challenge