Supported frameworks
| Framework | ID | Scope |
|---|---|---|
| CIS AWS Foundations Benchmark | cis-aws | AWS accounts |
| CIS GCP Foundations Benchmark | cis-gcp | GCP projects |
| CIS Azure Foundations Benchmark | cis-azure | Azure subscriptions |
| SOC 2 Type II | soc2 | All providers |
| NIST SP 800-53 Rev 5 | nist-800-53 | All providers |
| PCI-DSS v3.2.1 | pci-dss | All providers |
| HIPAA Security Rule | hipaa | All providers |
Enabling a framework
Choose a framework
Select the framework from the list and optionally scope it to specific providers.
Running an assessment
Trigger an assessment on demand from the Compliance page by clicking Run assessment, or via CLI:Reading assessment results
An assessment produces:- Overall score — the percentage of controls that passed
- Control list — each control’s pass/fail status with a description
- Affected resources — for failed controls, the specific resources that caused the failure
- Suggested fixes — remediation steps for each failed control
Control-to-resource mapping
For each failed control, InfraAudit links directly to the resources that caused the failure. For example, a CIS AWS control requiring S3 bucket server-side encryption lists every bucket where encryption is disabled — so you know exactly what to fix, not just that something failed.Multi-account assessments
When multiple providers are in scope, InfraAudit runs the assessment across all of them and shows per-account scores alongside the aggregate. This is useful for organizations running multiple AWS accounts under a single compliance program.Exporting results
You can export assessment results as PDF or CSV for audit evidence:
Via CLI:
CLI reference
Next steps
- Alerts — route compliance failures to Slack or email
- Remediation — apply automated fixes for failed controls
- Recommendations — view AI-generated suggestions for failed controls