Tracking events and access to resources plays a crucial role for IT administrators at organizations that need to prove compliance. For Service Organization Control 2 (SOC 2) compliance, an event logging solution covers several of an organization’s requirements. Using JumpCloud®Directory Insights™, IT administrators can centralize their governance needs with their directory service in the cloud.
What is Directory Insights?
JumpCloud’s premium Directory Insights feature provides event logging across the entire Directory-as-a-Service® platform. Directory Insights details events such as password and group membership changes, as well as any alterations to SSH keys or MFA status. Access to Windows®, Mac®, and Linux® systems, SAML, LDAP, and RADIUS resources are tracked as well, along with every time a user logs into their JumpCloud User Portal.
Directory Insights is available to use in the JumpCloud Admin Portal’s Insights tab, so you visualize your audit logs and make any necessary changes to users and their access rights through a single pane of administrative glass in the cloud or through scripting in PowerShell. Admins can opt to use Directory Insights as their sole event logging tool, or tie it into a Security Information and Event Management (SIEM) or other analytics solutions through the JumpCloud API.
Directory Insights and SOC 2 Compliance
SOC 2 compliance is unique to each organization’s specific operations, but broadly stipulated through five key Trust Service Criteria (TSC) as detailed by the American Institute of CPAs (AICPA): security, availability, processing integrity, confidentiality, and privacy. Directory Insights supports these by building an audit trail of a Directory-as-a-Serviceinstance that admins can use to identify potential vulnerabilities and address them, respond in the case of a security incident, and prove they have the ability to do so.
Let’s break down how Directory Insights supports each of the SOC 2 TSC.
The Directory Insights UI provides event logs, showing when and where (by IP address) their users access the tools they’ve been authorized, as well as any changes to their group membership, passwords, or access rights. If an event appears to be unauthorized, (Read more...)
*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Zach DeMeyer. Read the original post at: https://jumpcloud.com/blog/directory-insights-soc-2-compliance