Authentication & Access Monitors
Learn how Sprinto enforces authentication and access security through MFA, login protection, access rule monitoring, and inactive user detection.
Sprinto provides a comprehensive set of monitors to ensure your organisation enforces strong authentication and access control measures. These checks help validate that user identities are secured, access is tightly governed, and critical systems are protected against unauthorised entry.
This section covers monitors related to:
Multi-Factor Authentication (MFA)
Login protection mechanisms
Auto account lockout
Inactive user cleanup
Access rules on critical systems
Monitored Controls
Multi-Factor Authentication (MFA)
Sprinto verifies that MFA is enabled for users across all critical systems and cloud platforms. This includes checks for:
AWS
Root and IAM user MFA setup
GitHub
Individual and org-level MFA enforcement
Bitbucket
Personal and team MFA
Office365 / Azure
Conditional access with MFA enforcement
Google Workspace
Enforced MFA for all users
Okta
2FA / MFA policy enabled
Monitor Actions
Integration-based auto check (where supported)
Step-by-step remediation guides for enabling MFA
Manual evidence upload if integration is not feasible
Login Protection & Lockout
Sprinto validates whether systems enforce secure login protection methods, including:
Brute-force attack prevention
Auto account lockout after failed attempts
Password policy enforcement (length, complexity, expiry)
These monitors help detect vulnerabilities in authentication workflows and enforce corrective action.
Inactive User Cleanup
Inactive user credentials are a common attack vector. Sprinto includes monitors that:
Identify stale users on AWS, Azure, and other platforms
Check for users with active access but no recent activity
Recommend disabling or removing unused accounts
Access Rule Configuration
Sprinto checks if access control rules are implemented correctly on critical systems, such as:
Access based on role or business need
Least-privilege enforcement
Login protection on infrastructure services
Access review configurations for sensitive systems
Remediation Workflow
Each failing monitor includes a resolution workflow with:
Summary of the issue
Recommended steps to configure the required control
Links to platform-specific setup guides (e.g., AWS IAM, GitHub MFA)
Option to upload proof (evidence) if automation is not available
All changes made on external platforms (e.g., enabling MFA) are detected by Sprinto in the next sync cycle.
Best Practices
Enforce MFA universally and monitor its configuration via integrations.
Review access control monitors weekly to identify policy drift.
Lock unused accounts regularly.
Maintain a documented access review process.
Last updated