Forum Discussion
NicoleBruno
3 years agoValued Contributor
Hello!
We do something similar to your #1 - we extract the security reports out of OS along with screenshots showing we ran them from OS as of a date and time for the auditors. The only difference is that we have one person responsible for understanding users and security so we have him review and approve the control before forwarding to the auditors. Nothing automated unfortunately though less people involved in ours so less time overall required.
-Nicole