Skip to main content

Compliance Coverage

GrantFlow is a cloud-native Privileged Access Management (PAM) solution designed to help organizations meet critical security and compliance requirements. This page documents how GrantFlow addresses specific controls from leading regulatory frameworks, making it easier to demonstrate compliance to auditors and stakeholders.

Overview

GrantFlow implements preventive controls that address privileged access management requirements across multiple compliance frameworks. Rather than relying solely on detective controls like session recording, GrantFlow proactively prevents unauthorized access through Just-In-Time provisioning, time-bound grants, mandatory approval workflows, and comprehensive audit trails.

The platform's core capabilities align with these control categories:

CategoryDescriptionGrantFlow Feature
Privileged Access ManagementControl over administrative accountsJIT Activation, Eligibility Management
Least PrivilegeMinimal necessary rightsTime-bound Grants, Role-based Access
Access ControlAccess restrictions and enforcementApproval Workflows, Policy Enforcement
Audit & AccountabilityTraceability and evidenceImmutable Audit Trail
Access ReviewsRegular verificationRecertification, Eligibility Reviews
Segregation of DutiesSeparation of functionsMulti-Approver Workflows
Proactive Security Model

GrantFlow focuses on preventing unauthorized access before it occurs, rather than just recording what happens during sessions. This approach—combining Zero Standing Privileges, JIT Access, and mandatory business justification—addresses the root cause of privileged access risk.

SOC 2 Trust Services Criteria

SOC 2 compliance centers on five Trust Services Criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy. GrantFlow provides strong coverage for the Security (Common Criteria) requirements.

Security Controls

ControlDescriptionCoverageEvidence Provided
CC6.1Logical access security✅ CompleteJIT activations eliminate standing privileges
CC6.2Authentication before access✅ CompleteEntra ID integration, approval workflows
CC6.3Access rights removal✅ CompleteAutomatic deprovisioning at expiration
CC6.6Access reviews✅ CompleteAccess reviews, eligibility audits
CC6.7Privileged access restrictions✅ CompleteTime-bound grants, business justification
CC7.2System monitoring✅ SupportedAudit trail of all privileged actions
CC7.3Security event evaluation✅ SupportedFilterable audit events, export capability
CC8.1Change authorization⚠️ PartialApproval workflows for role activations

Audit Evidence

GrantFlow automatically generates the following evidence for SOC 2 audits:

  • Activation history with timestamps showing exactly when privileged access was granted and revoked
  • Approval protocols including approver identities and approval timestamps
  • Business justifications documented for every access request
  • Deprovisioning logs demonstrating automatic access removal
  • Eligibility matrix reports showing who has potential access to which resources

ISO 27001:2022 Annex A

ISO 27001 is the international standard for information security management. GrantFlow addresses controls in both the Organizational (A.5) and Technological (A.8) domains.

Organizational Controls (A.5)

ControlNameCoverageCustomer Benefit
A.5.15Access Control Policy✅ DirectPolicy-based access rules enforced automatically
A.5.16Identity Management✅ DirectUnified directory for Entra ID and Active Directory
A.5.17Authentication Information✅ SupportedIntegration with Entra ID MFA
A.5.18Access Rights✅ DirectJIT provisioning, automatic revocation
A.5.24Incident Management⚠️ SupportedAudit logs support incident investigation
A.5.25Security Event Assessment⚠️ SupportedFilterable audit events
A.5.28Evidence Collection✅ DirectImmutable audit trail for forensic analysis
A.5.33Protection of Records✅ DirectAppend-only audit collections

Technological Controls (A.8)

ControlNameCoverageCustomer Benefit
A.8.2Privileged Access Rights✅ CompleteCore product—JIT, time-bound, approval-based
A.8.3Information Access Restriction✅ DirectRole-based eligibility, policy enforcement
A.8.5Secure Authentication✅ SupportedEntra ID integration with MFA support
A.8.10Information Deletion✅ DirectAuto-deprovisioning logs
A.8.15Logging✅ DirectComprehensive audit trail
A.8.18Privileged Utility Programs✅ DirectControl over admin tools via roles
ISO 27001 Certification Support

GrantFlow provides the technical controls and audit evidence needed to support your organization's ISO 27001 certification. The platform generates documentation demonstrating compliance with Annex A controls related to privileged access management.

NIST 800-53 Rev. 5

NIST Special Publication 800-53 provides a catalog of security and privacy controls for federal information systems. GrantFlow addresses key controls in the Access Control (AC) and Audit and Accountability (AU) families.

Access Control Family

ControlNameCoverageDescription
AC-2Account Management✅ DirectAccount lifecycle, eligibility management
AC-2(2)Automated Temporary Accounts✅ CompleteJIT activations with automatic expiration
AC-2(4)Automated Audit Actions✅ CompleteAudit events for all account changes
AC-2(6)Dynamic Privilege Management✅ CompleteCore feature—time-based privileges
AC-2(7)Privileged User Accounts✅ CompleteDedicated PAM for privileged accounts
AC-3Access Enforcement✅ DirectPolicy-based access control
AC-5Separation of Duties✅ SupportedMulti-approver workflows
AC-6Least Privilege✅ CompleteTime-bound grants, minimal rights
AC-6(1)Authorize Access to Security Functions✅ DirectEligibility for specific roles
AC-6(2)Non-privileged Access✅ SupportedSeparate admin/user roles
AC-6(5)Privileged Accounts✅ CompleteRestriction to defined roles
AC-6(7)Review of User Privileges✅ DirectAccess reviews, recertification
AC-6(9)Log Use of Privileged Functions✅ CompleteAudit trail of all activations
AC-6(10)Prohibit Non-privileged Users✅ DirectEligibility-based access control

Audit and Accountability Family

ControlNameCoverage
AU-2Auditable Events✅ Complete
AU-3Content of Audit Records✅ Complete
AU-6Audit Review and Analysis✅ Supported
AU-9Protection of Audit Information✅ Complete
AU-12Audit Generation✅ Complete

CIS Controls v8

The CIS Critical Security Controls provide prioritized cybersecurity best practices. GrantFlow addresses controls in Safeguards 5 (Account Management) and 6 (Access Control Management).

ControlSafeguardCoverageDescription
5.1Establish Account Inventory✅ DirectAccounts, eligibilities, assignments
5.2Use Unique Passwords✅ SupportedPassword vault integration (planned)
5.3Disable Dormant Accounts✅ DirectAuto-deprovisioning, access reviews
5.4Restrict Administrator Privileges✅ CompleteCore product—JIT admin access
5.5Establish Service Account Inventory✅ DirectService account management
6.1Establish Access Granting Process✅ CompleteApproval workflows
6.2Establish Access Revoking Process✅ CompleteAuto-deprovisioning
6.3Require MFA for External Apps✅ SupportedEntra ID MFA integration
6.5Require MFA for Admin Access✅ SupportedEntra ID MFA support
6.6Inventory of Auth Systems✅ DirectConnectors, directory integration
6.7Centralize Access Control✅ CompleteUnified PAM platform
6.8Define Role-Based Access✅ CompleteEligibility matrix, role policies

PCI DSS 4.0

The Payment Card Industry Data Security Standard requires strict access controls for cardholder data environments. GrantFlow helps meet requirements in sections 7 (Restrict Access), 8 (Identify Users), and 10 (Log and Monitor).

RequirementDescriptionCoverage
7.1Restrict access by business need✅ Complete
7.2.1Coverage of systems✅ Direct
7.2.2Assignment based on job function✅ Direct
7.2.4Appropriate privileges✅ Complete
7.2.5Access reviews✅ Direct
7.2.5.1Review of all access privileges✅ Direct
8.2.1Unique user IDs✅ Supported
8.2.2Verify identity before modifying auth✅ Supported
8.3.1MFA for CDE access✅ Supported
8.4.2MFA for all CDE access✅ Supported
8.6.1System/application accounts✅ Direct
8.6.3Password protection for service accounts⚠️ Planned
10.2.1Audit logs enabled✅ Complete
10.2.1.1Individual user access✅ Complete
10.2.1.2Actions by admins✅ Complete

HIPAA Security Rule

The HIPAA Security Rule establishes standards for protecting electronic protected health information (ePHI). GrantFlow addresses both Administrative and Technical Safeguards.

Administrative Safeguards (§164.308)

StandardImplementationCoverage
Access AuthorizationRole-based access✅ Direct—Eligibility management
Access Establishment/ModificationProcess for granting access✅ Direct—Approval workflows
Termination ProceduresRevoke access✅ Direct—Auto-deprovisioning
Workforce ClearanceAppropriate access✅ Direct—Access reviews
Security Incident ProceduresIncident response⚠️ Supported—Audit logs
EvaluationPeriodic assessment✅ Supported—Access review reports

Technical Safeguards (§164.312)

StandardImplementationCoverage
Access ControlsUnique user ID✅ Direct
Access ControlsEmergency access⚠️ Planned—Break-glass feature
Access ControlsAutomatic logoff✅ Direct—Time-bound sessions
Audit ControlsHardware/software mechanisms✅ Complete—Audit trail
Person or Entity AuthenticationVerify identity✅ Supported—Entra ID integration

GDPR Article 32

The General Data Protection Regulation requires appropriate technical and organizational measures to ensure data security. GrantFlow supports GDPR Article 32 requirements for access control and accountability.

RequirementCoverageDescription
Confidentiality✅ DirectLeast privilege, access control
Integrity✅ SupportedAudit trail, change tracking
Availability✅ SupportedAzure high availability
Access Control✅ CompleteRole-based, time-bound access
Regular Testing⚠️ SupportedAccess reviews as part of testing
Documentation✅ DirectAudit trail as evidence

GDPR Article 32(4) requires that only authorized persons process data. GrantFlow ensures compliance by:

  • Granting access only to eligible individuals through approval workflows
  • Documenting every access with user identity, timestamp, and justification
  • Automatically revoking access rights upon expiration

NIS2 Directive

The NIS2 Directive (EU 2022/2555) establishes cybersecurity requirements for essential and important entities across the European Union.

RequirementArticleCoverage
Access Control PoliciesArt. 21(2)(i)✅ Complete
Privileged Account ManagementArt. 21(2)(i)✅ Complete
MFA/Strong AuthenticationArt. 21(2)(j)✅ Supported
Zero Standing PrivilegesBest Practice✅ Complete
Incident LoggingArt. 21(2)(g)✅ Complete
Least PrivilegeArt. 21(2)(i)✅ Complete
Supply Chain SecurityArt. 21(2)(d)⚠️ Supported
Basic Cyber HygieneArt. 21(2)(g)✅ Direct

GrantFlow addresses NIS2-specific requirements including:

  • Dedicated admin accounts: Separate administrative roles
  • 24-hour incident reporting: Complete audit history for rapid incident response
  • Zero Trust alignment: Never trust, always verify principle

DORA

The Digital Operational Resilience Act establishes ICT risk management requirements for financial entities in the EU.

RequirementArticleCoverage
ICT Access ControlArt. 9(4)✅ Complete
User IdentificationArt. 9(4)(b)✅ Complete
Account Management ProceduresArt. 9(4)(c)✅ Complete
Access RestrictionsArt. 9(4)(d)✅ Complete
Privileged Access ManagementArt. 9(4)(e)✅ Complete
Logging of ICT OperationsArt. 12✅ Complete
ICT Third-Party RiskArt. 28-30⚠️ Supported

GrantFlow's JIT access model reduces ICT risks by minimizing the attack surface, while the audit trail supports the 24-hour incident reporting requirement.

NIST Cybersecurity Framework 2.0

The NIST CSF provides a flexible framework for managing cybersecurity risk. GrantFlow addresses controls across the Protect and Detect functions.

FunctionCategoryCoverage
PROTECTIdentity Management (PR.AA)✅ Complete
PROTECTAccess Control (PR.AC)✅ Complete
PROTECTAwareness Training (PR.AT)⚠️ Not direct
DETECTContinuous Monitoring (DE.CM)✅ Supported
DETECTAnomaly Detection (DE.AE)⚠️ Planned
RESPONDAnalysis (RS.AN)✅ Supported
RECOVERRecovery Planning (RC.RP)⚠️ Not direct

BSI IT-Grundschutz

The BSI IT-Grundschutz is the German standard for information security management, widely adopted in the DACH region.

Building BlockRequirementCoverage
ORP.4Identity and Authorization Management✅ Complete
ORP.4.A1Rules for user setup✅ Eligibility management
ORP.4.A2Setup and modification of permissions✅ Approval workflows
ORP.4.A3Documentation of permissions✅ Audit trail
ORP.4.A6Permission revocation✅ Auto-deprovisioning
ORP.4.A9Identification and authentication✅ Entra ID integration
ORP.4.A12IAM concept development✅ PAM as a Service
ORP.4.A16Privileged permissions✅ Core product
OPS.1.1.3Patch and change management⚠️ Via approval workflows
DER.1Detection of security events✅ Audit trail

Coverage Summary

This matrix summarizes GrantFlow's coverage of primary controls across all supported frameworks.

FrameworkPrimary ControlsCoverageCore Strength
SOC 2CC6 (Access Control)95%JIT + Audit
ISO 27001A.8.2 (Privileged Access)100%Complete
NIST 800-53AC-2, AC-6 (Access Control)95%Dynamic Privilege
CIS Controls v85, 6 (Account/Access)90%Centralized PAM
PCI DSS 4.07, 8, 10 (Access, Auth, Audit)85%Access Reviews
HIPAAAccess Controls85%Audit Trail
GDPR Art. 32Access Control, Logging80%Documentation
NIS2Art. 21 (Security Measures)85%Zero Trust
DORAArt. 9 (ICT Risk Management)85%PAM + Audit
BSI GrundschutzORP.4 (Permissions)85%IAM Concept

Preventive vs. Detective Controls

Understanding the difference between preventive and detective controls helps explain GrantFlow's compliance approach.

Traditional Approach: Session Recording

Session recording captures user activities during privileged sessions, providing:

  • Video or keystroke recording of actions
  • Post-incident forensic analysis
  • Compliance evidence of what was done

GrantFlow Approach: Prevention First

GrantFlow implements preventive controls that stop unauthorized access before it occurs:

RequirementSession RecordingGrantFlow
TraceabilityVideo/keystrokeWho, when, why, how long
Privilege controlAfter the factProactive—prevents unauthorized access
Least privilegeObservation onlyEnforcement—time-bound, JIT
Audit trailSession recordingsActivation history, approvals
Incident responseReplay for analysisAudit logs, correlation IDs
Auditor Talking Point

GrantFlow implements preventive controls rather than only detective controls. Instead of recording what an administrator does, we prevent unauthorized access through Zero Standing Privileges, Just-In-Time Access, time-bound grants, mandatory business justification, and approval workflows. Each of these measures is fully audited and demonstrable.

What Preventive Controls Achieve

These capabilities are not replaceable by session recording alone:

ControlSession RecordingGrantFlow
Least privilege enforcement
Automatic access revocation
Approval workflows
Business justification
Access reviews

Feature Roadmap

GrantFlow continues to expand its compliance coverage with planned enhancements.

Currently Available

  • Just-In-Time privileged access
  • Approval workflows with multi-approver support
  • Comprehensive immutable audit trail
  • Access reviews and recertification
  • Entra ID and Active Directory integration

Planned Enhancements

FeatureTargetCompliance Impact
SIEM IntegrationQ1 2025Strengthens CC7.2, CC7.3, A.8.15
Step-Up MFAQ1 2025Strengthens CC6.2, A.8.5, PCI 8.4.2
Break-Glass AccessQ1 2025Addresses HIPAA emergency access
Password VaultQ2 2025Addresses PCI 8.6.3, CIS 5.2
Session RecordingQ2 2025Completes monitoring controls

For more information on GrantFlow's security capabilities, see: