# User Decisioning

User decisioning in Sprinto refers to the process of classifying users based on their risk and relevance to compliance monitoring. By mapping users to specific platforms, systems, or roles, Sprinto allows you to determine whether they are in-scope for checks like multi-factor authentication (MFA), access reviews, or login protection.

This article outlines how user decisioning works in Sprinto, which platforms are covered, and how to take appropriate actions on detected users.

***

### What is User Decisioning

When Sprinto integrates with platforms such as AWS, GitHub, Google Workspace, or Azure, it automatically pulls user lists and maps them to relevant checks. **User decisioning** allows you to:

* Mark users as **In Scope** or **Not in Scope**
* Determine if a user requires resolution (e.g., MFA not enabled)
* Filter users by role, activity status, or platform
* Focus remediation efforts only on relevant accounts

***

### Supported Platforms

Sprinto supports user decisioning on the following platforms:

1. **Cloud Infrastructure**:
   * AWS (IAM Users, Root Users)
   * GCP, Azure
2. **Identity Providers & SaaS**:
   * Google Workspace
   * Microsoft 365 / Azure AD
   * Okta, OneLogin
   * Zoho
3. **Version Control & DevOps**:
   * GitHub
   * GitLab
   * Bitbucket
   * Azure DevOps
   * AWS CodeCommit
4. **Database & Cloud Services**:
   * MongoDB Atlas
   * Oracle Cloud (select entities)

***

### How to Perform User Decisioning

1. **Go to Monitoring > Check History**
2. Click into a check that involves users (e.g., “MFA not enabled for GitHub users”)
3. Click **View Users**
   * A table will show:
     * Username or email
     * Role or group (if available)
     * Whether MFA or other controls are enabled
     * Last login or activity (if available)
4. **Take Action per User**
   * Click on the dropdown next to the user
   * Choose:
     * **Resolve** – If control is now enforced (e.g., MFA enabled)
     * **Not in Scope** – If the user does not require enforcement (e.g., service account, inactive user)
     * **Remind** – Use for pending controls awaiting end-user action

***

### Use Case Examples

<table><thead><tr><th width="172.1484375">Platform</th><th width="358.41015625">Action</th></tr></thead><tbody><tr><td>GitHub</td><td>Mark inactive contractors as Not in Scope</td></tr><tr><td>AWS</td><td>Exclude service-linked IAM users</td></tr><tr><td>Google Workspace</td><td>Flag shared mailboxes as Not in Scope</td></tr><tr><td>Okta</td><td>Confirm MFA setup and resolve users</td></tr></tbody></table>

***

### Best Practices

* Periodically review in-scope user lists for each integration
* Exclude users only when fully justified (e.g., unused, service accounts)
* Ensure evidence (e.g., user export, policy assignment) is available for review
* Use platform-native MFA policies to enforce compliance at scale
