Inbox › Exception
CC-6.1 · MFA enforcement (exec workstations)
2 users opted out — auto-pulled from Okta, needs your justification
Auto-collected evidence
Pulled from Okta · 4 min ago
MFA enrollment status pulled for the exec-workstations Okta group. Of 14 users, 12 have MFA enabled. 2 are opted out with active grace period.
{
"control": "CC-6.1",
"frameworks": ["SOC 2", "ISO 27001", "NIST CSF"],
"pulled_at": "2026-05-02T10:24:11Z",
"source": "okta.users.list?group=exec-workstations",
"summary": {
"total_users": 14,
"mfa_enrolled": 12,
"mfa_opted_out": 2,
"compliance_rate": 0.857
},
"exceptions": [
{ "user": "j.morton@auditborb.com", "reason": "device replacement", "expires": "2026-05-09" },
{ "user": "r.singhi@auditborb.com", "reason": "travel exception", "expires": "2026-05-15" }
]
}
Auditborb AI · Both opt-outs are within policy (≤30 day grace period, documented reasons). Suggested justification: "Two users on temporary opt-out for documented reasons; both expire within 14 days. Compensating control: SSO + IP allow-list active."
Justification (required for sign-off)
Activity
Today, 10:24
Auditborb · auto-collection
Pulled IAM data from Okta. Detected 2 opt-outs → flagged as exception.
Today, 10:25
Auditborb AI
Generated justification draft based on policy and historical patterns.
Pending
John A. · control owner
Review and approve with justification.
Pending
Anton L. · CISO
Counter-sign for SOC 2 evidence packet.
Step 3 of 3 — The owner only sees what really needs human judgment. Raw data is pre-collected, AI drafts a justification, owner edits or approves. The same artifact then satisfies multiple frameworks automatically.