Skip to main content

How I Prepare for Cloud Vendor Audits (Azure & AWS) - A Practical View from the Field

 In the last few years, I was directly involved in five cloud vendor audits: three for Azure competencies (migration + modernisation) and two for AWS, including the migration-related one. After you do a few of them, you understand that audit is not only about “having the right architecture”. It is mainly about process, traceability, and evidence, and about being able to explain why you did something one way rather than exactly as in the vendor reference.

Below, I share the approach I use, grouped in phases: before preparation, during preparation, audit day, and after audit. This is written in a very practical way, because in real life, you don’t win with theory, you win with organisation.


1) Before you start: set the foundation (and remove surprises)

Understand requirements like a technical checklist, not like a brochure.

The first step is simple and hard: a deep understanding of the technical requirements for every section. Not only must the audit lead understand it, but the project team members who will present evidence must also understand it. I always insist on a short internal session where we translate vendor language into exactly what they want to validate.

Align legal and contractual constraints early (NDA is not a detail)

Before selecting projects, you must validate the NDA and contractual permissions. Many audits require sharing artefacts, screenshots, architecture, even SOW or meeting minutes. If you find later that the client's legal is blocking it, you lose weeks. So I recommend: legal check as a formal phase, not as an email at the end.

Define “evidence” very broadly, and make it explicit.

One big confusion in teams is: “What is evidence?” For me, evidence can be:
  • a document (design, ADR, SOP, runbook)
  • code or repo structure
  • screenshot from cloud console or CI/CD tool
  • email, Teams chat, meeting minutes
  • SOW, contract excerpt, acceptance criteria
  • ticket history (Jira/Azure DevOps) showing decisions and approvals
If the team thinks evidence = only Word documents, you will fail, because many strong proofs are living in systems and tools.

2) During preparation: build traceability and choose the right projects

Use an evidence index (Excel) and one controlled repository.

I always create a simple Excel evidence index with columns like: checklist item, requirement, project, evidence link/path, owner, date, status, blockers. This is the spine of the audit. In parallel, create a folder structure (access-controlled) if you need local copies, PDFs, exports, etc.
Important: every checklist line must map to a single owner and a single primary artefact. If you have 10 links per question, the audit becomes chaotic.

Select projects strategically (not only “the biggest”)

Vendors often ask for evidence across multiple projects, sometimes three projects, but in some sections, they accept evidence only from two of them. So you must map exactly: how many projects per section and which ones.
I recommend avoiding “pure automation” projects where only 1–2 roles were involved (example: only testing + dev). For audit, the best projects have a full delivery footprint: development, testing, infrastructure, CI/CD, security, and operations. Also, pick projects with good documentation, because an audit is presentation with proof.

Ensure project representatives have access to client systems

During the audit, the people representing projects must have access to all relevant client systems where evidence exists (cloud portal, CI/CD, monitoring, ticketing). If access is missing, even if you “did the work”, you cannot demonstrate it. This is one of the most common failures.

Don’t try to do it with one hero.

It is tempting to put one person in charge of all projects, but it is risky and burns them out. Better model:
  • One representative per project (prepares evidence, knows context)
  • One technical owner/audit lead (coordinates, validates narrative, controls quality)
  • The program manager helps with the timeline, RACI, and stakeholder alignment.
Also, you must estimate effort and budget it. Audit preparation consumes real time. If you don’t reserve capacity, you will get “best effort” outputs.

Pre-assessment and dry-run are not optional

Run a pre-assessment: for each requirement, confirm that there is at least one piece of evidence and that it is accessible. Then do a dry run with the full team: go through evidence links, write short demo scripts, and rehearse Q&A. You will find broken links, missing permissions, and unclear answers, better to find internally than in front of the vendor.

3) Audit day: run it like an operation

On audit day, use a runbook with a timeline, who joins when, the escalation path, evidence links, and demo scripts with fallback screenshots. Keep demos short. If something is not 1:1 with the vendor recommendation, it is acceptable in my experience, if you can clearly motivate why you did differently and how you still meet the intent (security, reliability, governance, cost control, etc.).
Also, for cloud vendor audits, SMEs should have an overall understanding of the project: infrastructure, CI/CD, and architecture. If only app people attend, many questions remain unanswered.

4) After audit: close the loop

Do a short lessons learned session and update your internal templates (landing zone design notes, cost calculation approach, governance SOPs). This is how the next audit becomes easier.

Final thought

A successful audit does not need to be perfect. It is about clarity, evidence, and traceability. If you prepare with structure, the right projects, the right people, and a strong evidence index, the audit becomes predictable, and even useful, because it forces good discipline in delivery.

Comments

Popular posts from this blog

Why Database Modernization Matters for AI

  When companies transition to the cloud, they typically begin with applications and virtual machines, which is often the easier part of the process. The actual complexity arises later when databases are moved. To save time and effort, cloud adoption is more of a cloud migration in an IaaS manner, fulfilling current, but not future needs. Even organisations that are already in the cloud find that their databases, although “migrated,” are not genuinely modernised. This disparity becomes particularly evident when they begin to explore AI technologies. Understanding Modernisation Beyond Migration Database modernisation is distinct from merely relocating an outdated database to Azure. It's about making your data layer ready for future needs, like automation, real-time analytics, and AI capabilities. AI needs high throughput, which can be achieved using native DB cloud capabilities. When your database runs in a traditional setup (even hosted in the cloud), in that case, you will enc...

How to audit an Azure Cosmos DB

In this post, we will talk about how we can audit an Azure Cosmos DB database. Before jumping into the problem let us define the business requirement: As an Administrator I want to be able to audit all changes that were done to specific collection inside my Azure Cosmos DB. The requirement is simple, but can be a little tricky to implement fully. First of all when you are using Azure Cosmos DB or any other storage solution there are 99% odds that you’ll have more than one system that writes data to it. This means that you have or not have control on the systems that are doing any create/update/delete operations. Solution 1: Diagnostic Logs Cosmos DB allows us activate diagnostics logs and stream the output a storage account for achieving to other systems like Event Hub or Log Analytics. This would allow us to have information related to who, when, what, response code and how the access operation to our Cosmos DB was done. Beside this there is a field that specifies what was th...

[Post Event] Azure AI Connect, March 2025

On March 13th, I had the opportunity to speak at Azure AI Connect about modern AI architectures.  My session focused on the importance of modernizing cloud systems to efficiently handle the increasing payload generated by AI.