Create Automated Checks
Learn how to define and run custom automated compliance checks on integrated or native entities using Sprinto’s rule builder and evaluation engine.
Sprinto’s Automated Checks feature allows you to define your own logic-driven compliance checks using entity data available through your integrations or native platform entities. These checks run automatically on a defined schedule, generate evidence for audits, and can be mapped to specific controls to fulfil compliance requirements.
This is especially useful when:
The existing Sprinto check library doesn’t cover your internal policy
You want to enforce custom logic on integrated systems (e.g., AWS, GitHub, Google Workspace)
You need to monitor native entities like Risks, Vendors, or Users with specific evaluation rules
Automated checks are a step up from workflow checks. While workflow checks operate on fixed cycles and rely on manual evidence uploads, automated checks use real-time entity data and generate evidence programmatically.
Before You Begin
To create an automated check, ensure:
Your integration is complete — only integrated or native entities appear in the entity list.
You are an Admin or have permission to access the Monitoring page.
You know what data field or logic you want to validate.
Steps to Create an Automated Check
1. Open the Check Creation Panel
Log into the Sprinto Dashboard.
Navigate to Monitoring from the left nav.
Click Create check in the top-right corner.
Select Create automated check from the list.

This opens a three-step drawer: Configure check evaluation → Check details → Configure check SLA.
2. Configure Check Evaluation
In Step 1, define the logic and entity scope.
a. Select Entity to Monitor
Choose an entity that is either integrated (for example, AWS Redshift Cluster, IAM User and so on) or native (for example, Vendor and Risk).
Only entities with data available for your org are shown.

Prerequisite: The integration must be active. If no entities are found, it likely means the source is not integrated yet.
b. View Schema
Click Entity schema to see a full list of available attributes and their data types.
This is your reference guide to build the check logic.

c. Define Evaluation Rules
Use the rule builder to specify logic:
Each rule consists of: Field, Operator (for example, is, is not, contains), and Value.
Add multiple rules or nested rule groups using logical operators (AND/OR).

Example rules:
severity = critical
region is not us-east-1
isEncrypted = false
d. Run a Test
Click Test to simulate the logic on a sample set of entity records.
Entities that pass/fail the criteria will be shown.
This does not affect live evidence or create tasks.

3. Add Check Details
In Step 2, define metadata for the check:
Name: Descriptive title for the check (e.g., "S3 Buckets Must Be Encrypted")
Description: What the check evaluates
Instructions: Guidance on how to resolve failures
Owner: Person responsible for fixing failed tasks
Once the check is created, Sprinto will automatically assign any failed entities to the owner.

4. Configure SLA and Escalations
In Step 3, define how Sprinto should track and escalate failed tasks:
Due: Number of days before task is due
Critical: Escalate after X days to a specific user (for example, InfoSec officer)
Failing: SLA is breached after Y days

5. Click "Create Check"
Once saved:
The check enters Active state.
It immediately evaluates all relevant entities.
Tasks are created if failures are detected.
The check appears under Automated in the Monitoring tab.

Understand What Happens After
Once created, an automated check behaves like all other monitors in Sprinto:
Appears in the Monitoring table under "Automated Checks".
Triggers pending tasks for failing entities.
Tasks are routed through the full lifecycle: Due → Critical → Failing.
Tasks appear on the Tasks Dashboard and can be fixed via Fix It drawers.
The check is visible across:
Monitoring page
Control Health Dashboard
CHDB and audit reports (when mapped to a control)
Entity Detail pages, Overview pages, and Data Library.
Evidence is included in audits only when the check is mapped to a control, and that control is linked to an audit.
Supported Entities
You can write checks against:
Integrated entities (for example, EC2 instances, GitHub repos, GWorkspace users and so on)
Native Sprinto entities (for example, Risks, Vendors, Users, Policies and so on)
The supported entities table contains:
A list of all entity types
Attributes and data types for each
Sample rules to help you get started
Uncategorised
AWS Security Hub
Codacy
Crowdstrike Spotlight
Deepsource
Intruder
Jira Vuln Provider
Microsoft Defender Endpoint
Socket
Tenable
AWS Inspector (Finding)
Azure Defender
Dependabot (Vulnerability Alert)
Google Security Center (Finding)
Halo Security
Qualys
Rapid Fort
Semgrep
SL Scan
Snyk
Sonarcloud
Sonarqube
Repositories
GitLab Repo Group
GitHub Repo Group
Bitbucket Repo Group
Azure DevOps Repo Group
AWS CodeCommit Repo Group
GitLab Repo
GitHub Repo
Bitbucket Repo
Azure DevOps Repo
AWS CodeCommit Repo
Access Management
Azure DevOps User
Azure User
Bitbucket User
AWS CodeCommit User
GCP User
GitHub User
GitLab User
GSuite User
MongoAtlas User
Office365 User
Okta User
Zoho User
AWS User
Bitbucket Access
GitHub Access
GitLab Access
CRM
Accelo User
Active Campaign User
Asana Access User
Incident Management
Azure Active Directory Access User
BambooHR Access User
Basecamp User
Box User
HRMS
Calendly User
MDM
Cisco Meraki User
ClickUp Access User
Close User
Vulnerabilities
Cloudflare User
Infra
Confluence User
Copper User
Databricks Access User
Datadog Access User
DocuSign User
Assets
Files.com User
Database
Fireflies AI User
FreeAgent User
Freshdesk User
Storage
Fresh Service User
IAM Roles
Front User
Google Analytics User
IAM Roles
Grafana Access User
Security Groups
HelpScout Access User
IAM Policies
HubSpot User
Intercom User
Firewall
Jenkins User
VPN
JetBrains User
Load Balancer
Jira Access User
Keap User
Logging
Keeper Security User
Certs
KnowBe4 User
LastPass User
Linear Access User
Container Services
Metabase User
Microsoft Teams User
Miro User
Monitoring
Monday User
Moneybird User
Netlify User
KMS
New Relic Access User
Others
Notion User
OneLogin User
OpenAI User
Best Practices
Use schema viewer
Understand available attributes before building logic
Always test the rule
Avoid false positives and unnecessary alerts
Assign a clear owner
Ensures accountability and faster remediation
Set escalation timelines
Keeps failing checks visible to stakeholders
Map to controls
Enables audit evidence generation
Last updated