Prototype · Option A John A. — control owner
Option A1Connect a source›2Inbox›3Review exception

Auto-collected evidence

Pulled from Okta · 4 min ago
MFA enrollment status pulled for the exec-workstations Okta group. Of 14 users, 12 have MFA enabled. 2 are opted out with active grace period.
{ "control": "CC-6.1", "frameworks": ["SOC 2", "ISO 27001", "NIST CSF"], "pulled_at": "2026-05-02T10:24:11Z", "source": "okta.users.list?group=exec-workstations", "summary": { "total_users": 14, "mfa_enrolled": 12, "mfa_opted_out": 2, "compliance_rate": 0.857 }, "exceptions": [ { "user": "j.morton@auditborb.com", "reason": "device replacement", "expires": "2026-05-09" }, { "user": "r.singhi@auditborb.com", "reason": "travel exception", "expires": "2026-05-15" } ] }
Auditborb AI · Both opt-outs are within policy (≤30 day grace period, documented reasons). Suggested justification: "Two users on temporary opt-out for documented reasons; both expire within 14 days. Compensating control: SSO + IP allow-list active."

Justification (required for sign-off)

Activity

Today, 10:24
Auditborb · auto-collection
Pulled IAM data from Okta. Detected 2 opt-outs → flagged as exception.
Today, 10:25
Auditborb AI
Generated justification draft based on policy and historical patterns.
Pending
John A. · control owner
Review and approve with justification.
Pending
Anton L. · CISO
Counter-sign for SOC 2 evidence packet.
Step 3 of 3 — The owner only sees what really needs human judgment. Raw data is pre-collected, AI drafts a justification, owner edits or approves. The same artifact then satisfies multiple frameworks automatically.