Integrating AWS, Azure, and GCP for Evidence Gathering
What to Pull
IAM settings, network policies, encryption, logging, backups/DR, vulnerability scan outputs.
Least-Privilege Access
Create scoped roles for evidence retrieval and log every call.
Normalize & Store with Provenance
Keep timestamps, source system, and collector identity to simplify auditor review.