User Decisioning
Use Sprinto’s user decisioning interface to mark users as in-scope or not-in-scope, resolve compliance gaps, and ensure platform-specific controls like MFA are enforced.
User decisioning in Sprinto refers to the process of classifying users based on their risk and relevance to compliance monitoring. By mapping users to specific platforms, systems, or roles, Sprinto allows you to determine whether they are in-scope for checks like multi-factor authentication (MFA), access reviews, or login protection.
This article outlines how user decisioning works in Sprinto, which platforms are covered, and how to take appropriate actions on detected users.
What is User Decisioning
When Sprinto integrates with platforms such as AWS, GitHub, Google Workspace, or Azure, it automatically pulls user lists and maps them to relevant checks. User decisioning allows you to:
Mark users as In Scope or Not in Scope
Determine if a user requires resolution (e.g., MFA not enabled)
Filter users by role, activity status, or platform
Focus remediation efforts only on relevant accounts
Supported Platforms
Sprinto supports user decisioning on the following platforms:
Cloud Infrastructure:
AWS (IAM Users, Root Users)
GCP, Azure
Identity Providers & SaaS:
Google Workspace
Microsoft 365 / Azure AD
Okta, OneLogin
Zoho
Version Control & DevOps:
GitHub
GitLab
Bitbucket
Azure DevOps
AWS CodeCommit
Database & Cloud Services:
MongoDB Atlas
Oracle Cloud (select entities)
How to Perform User Decisioning
Go to Monitoring > Check History
Click into a check that involves users (e.g., “MFA not enabled for GitHub users”)
Click View Users
A table will show:
Username or email
Role or group (if available)
Whether MFA or other controls are enabled
Last login or activity (if available)
Take Action per User
Click on the dropdown next to the user
Choose:
Resolve – If control is now enforced (e.g., MFA enabled)
Not in Scope – If the user does not require enforcement (e.g., service account, inactive user)
Remind – Use for pending controls awaiting end-user action
Use Case Examples
GitHub
Mark inactive contractors as Not in Scope
AWS
Exclude service-linked IAM users
Google Workspace
Flag shared mailboxes as Not in Scope
Okta
Confirm MFA setup and resolve users
Best Practices
Periodically review in-scope user lists for each integration
Exclude users only when fully justified (e.g., unused, service accounts)
Ensure evidence (e.g., user export, policy assignment) is available for review
Use platform-native MFA policies to enforce compliance at scale
Last updated