Create Automated Checks

Learn how to define and run custom automated compliance checks on integrated or native entities using Sprinto’s rule builder and evaluation engine.

Sprinto’s Automated Checks feature allows you to define your own logic-driven compliance checks using entity data available through your integrations or native platform entities. These checks run automatically on a defined schedule, generate evidence for audits, and can be mapped to specific controls to fulfil compliance requirements.

This is especially useful when:

  • The existing Sprinto check library doesn’t cover your internal policy

  • You want to enforce custom logic on integrated systems (e.g., AWS, GitHub, Google Workspace)

  • You need to monitor native entities like Risks, Vendors, or Users with specific evaluation rules

Automated checks are a step up from workflow checks. While workflow checks operate on fixed cycles and rely on manual evidence uploads, automated checks use real-time entity data and generate evidence programmatically.


Before You Begin

To create an automated check, ensure:

  • Your integration is complete — only integrated or native entities appear in the entity list.

  • You are an Admin or have permission to access the Monitoring page.

  • You know what data field or logic you want to validate.


Steps to Create an Automated Check

1. Open the Check Creation Panel

  1. Log into the Sprinto Dashboard.

  2. Navigate to Monitoring from the left nav.

  3. Click Create check in the top-right corner.

  4. Select Create automated check from the list.

This opens a three-step drawer: Configure check evaluation → Check details → Configure check SLA.


2. Configure Check Evaluation

In Step 1, define the logic and entity scope.

a. Select Entity to Monitor

  • Choose an entity that is either integrated (for example, AWS Redshift Cluster, IAM User and so on) or native (for example, Vendor and Risk).

  • Only entities with data available for your org are shown.

b. View Schema

  • Click Entity schema to see a full list of available attributes and their data types.

  • This is your reference guide to build the check logic.

c. Define Evaluation Rules

Use the rule builder to specify logic:

  • Each rule consists of: Field, Operator (for example, is, is not, contains), and Value.

  • Add multiple rules or nested rule groups using logical operators (AND/OR).

Example rules:

  • severity = critical

  • region is not us-east-1

  • isEncrypted = false

d. Run a Test

Click Test to simulate the logic on a sample set of entity records.

  • Entities that pass/fail the criteria will be shown.

  • This does not affect live evidence or create tasks.


3. Add Check Details

In Step 2, define metadata for the check:

  • Name: Descriptive title for the check (e.g., "S3 Buckets Must Be Encrypted")

  • Description: What the check evaluates

  • Instructions: Guidance on how to resolve failures

  • Owner: Person responsible for fixing failed tasks

Once the check is created, Sprinto will automatically assign any failed entities to the owner.


4. Configure SLA and Escalations

In Step 3, define how Sprinto should track and escalate failed tasks:

  • Due: Number of days before task is due

  • Critical: Escalate after X days to a specific user (for example, InfoSec officer)

  • Failing: SLA is breached after Y days

These timelines help stakeholders prioritise issues and reduce resolution time.


5. Click "Create Check"

Once saved:

  • The check enters Active state.

  • It immediately evaluates all relevant entities.

  • Tasks are created if failures are detected.

  • The check appears under Automated in the Monitoring tab.


Understand What Happens After

Once created, an automated check behaves like all other monitors in Sprinto:

  • Appears in the Monitoring table under "Automated Checks".

  • Triggers pending tasks for failing entities.

  • Tasks are routed through the full lifecycle: Due → Critical → Failing.

  • Tasks appear on the Tasks Dashboard and can be fixed via Fix It drawers.

  • The check is visible across:

    • Monitoring page

    • Control Health Dashboard

    • CHDB and audit reports (when mapped to a control)

    • Entity Detail pages, Overview pages, and Data Library.


Supported Entities

You can write checks against:

  • Integrated entities (for example, EC2 instances, GitHub repos, GWorkspace users and so on)

  • Native Sprinto entities (for example, Risks, Vendors, Users, Policies and so on)

The supported entities table contains:

  • A list of all entity types

  • Attributes and data types for each

  • Sample rules to help you get started

Uncategorised

AWS Security Hub

Codacy

Crowdstrike Spotlight

Deepsource

Intruder

Jira Vuln Provider

Microsoft Defender Endpoint

Socket

Tenable

AWS Inspector (Finding)

Azure Defender

Dependabot (Vulnerability Alert)

Google Security Center (Finding)

Halo Security

Qualys

Rapid Fort

Semgrep

SL Scan

Snyk

Sonarcloud

Sonarqube

Repositories

GitLab Repo Group

GitHub Repo Group

Bitbucket Repo Group

Azure DevOps Repo Group

AWS CodeCommit Repo Group

GitLab Repo

GitHub Repo

Bitbucket Repo

Azure DevOps Repo

AWS CodeCommit Repo

Access Management

Azure DevOps User

Azure User

Bitbucket User

AWS CodeCommit User

GCP User

GitHub User

GitLab User

GSuite User

MongoAtlas User

Office365 User

Okta User

Zoho User

AWS User

Bitbucket Access

GitHub Access

GitLab Access

CRM

Accelo User

Active Campaign User

Asana Access User

Incident Management

Azure Active Directory Access User

BambooHR Access User

Basecamp User

Box User

HRMS

Calendly User

MDM

Cisco Meraki User

ClickUp Access User

Close User

Vulnerabilities

Cloudflare User

Infra

Confluence User

Copper User

Databricks Access User

Datadog Access User

DocuSign User

Assets

Files.com User

Database

Fireflies AI User

FreeAgent User

Freshdesk User

Storage

Fresh Service User

IAM Roles

Front User

Google Analytics User

IAM Roles

Grafana Access User

Security Groups

HelpScout Access User

IAM Policies

HubSpot User

Intercom User

Firewall

Jenkins User

VPN

JetBrains User

Load Balancer

Jira Access User

Keap User

Logging

Keeper Security User

Certs

KnowBe4 User

LastPass User

Linear Access User

Container Services

Metabase User

Microsoft Teams User

Miro User

Monitoring

Monday User

Moneybird User

Netlify User

KMS

New Relic Access User

Others

Notion User

OneLogin User

OpenAI User

Don’t see your entity listed? Reach out to the Sprinto team to request it.


Best Practices

Tip
Why It Matters

Use schema viewer

Understand available attributes before building logic

Always test the rule

Avoid false positives and unnecessary alerts

Assign a clear owner

Ensures accountability and faster remediation

Set escalation timelines

Keeps failing checks visible to stakeholders

Map to controls

Enables audit evidence generation

Last updated