Audit prep can be a daunting task, requiring your team to regularly comb through logs and produce reports on your security practices.
Blumira’s Compliance Reports make audit assessments a breeze, integrating audit prep into your daily operations. Blumira allows you to schedule security reports at the click of a button to immediately show how you satisfy multiple regulatory requirements for CMMC, HIPAA, SOC 2, NIST and more.
What is SOC 2 Compliance?
SOC 2 (Service and Organization Controls) is a security framework developed by the American Institute of CPAs (AICPA). It mandates how organizations should manage customer data.
Requirement CC2.1: COSO Principle 13 - The entity obtains or generates and uses relevant, quality information to support the functioning of internal control.
- Captures Internal and External Sources of Data - Information systems capture internal and external sources of data.
- Processes Relevant Data into Information - Information systems process and transform relevant data into information. (Source)
How Can Blumira Help With SOC 2 Compliance?
Complying with SOC 2 can help strengthen an organization’s ability to protect its clients’ data against security risks. Blumira’s security operations platform helps your organization easily meet and exceed SOC 2 compliance requirements for logging and monitoring through our SIEM paired with XDR-supported threat detection and response.
By regularly running and scheduling Blumira’s SOC 2 reports, you can easily prove your compliance to an auditor for certain controls.
Which Reports Map to Which SOC 2 Controls?
See which Blumira reports map to which SOC 2 controls so you can easily hand over pre-built reports to your auditor to prove your compliance. Please note that each report is available for certain integrations, which are listed under report details below:
SOC 2 Compliance Controls | Blumira’s Global Reports |
SOC 2 A1.2 – USB Device Usage: Detect unauthorized devices plugged into endpoints | SOC2 - USB Device Attached (Windows) SOC2 - Mounted Device (MacOS) SOC2 - USB Device Attached (MacOS) Available for: Windows, MacOS |
SOC 2 CC3.2 – System Changes: Record critical configuration and policy changes | SOC2 - Windows GPO Updates SOC2 - Azure Policy Changes SOC2 - Firewall Configuration Change Available for: Palo Alto, FortiGate, Cisco ASA, SonicWall, SophosXG |
SOC 2 CC6.1 – Failed Logins: Identify brute force and other credential attacks | SOC2 - Failed Logins (Windows) SOC2 - Failed Logins (Linux) SOC2 - Failed Logins (MacOS) Available for: Windows, Linux, MacOS |
SOC 2 CC6.3 – Privileged Access: Track access by administrators and power users | SOC2 - Administrator Access (Windows) SOC2 - Admin/root Access (Linux) Available for: Windows, Linux |
SOC 2 CC6.3 – Logins by Location: Spot access from unfamiliar regions |
SOC2 - Logins from Outside the US SOC2 - Logins from Outside the UK SOC2 - Logins from Outside the AUS SOC2 - Logins from Outside the CA Available for: Azure, Microsoft 365, Duo, Okta |
SOC 2 CC6.3 – VPN Connections: Monitor remote access methods and users | SOC2 - VPN Connections Available for: FortiGate, Cisco ASA, WatchGuard, GlobalProtect, SonicWall, Sophos |
SOC 2 CC6.5 – Log Tampering: Detect modifications or deletions of log data | SOC2 Log Tampering - Clearing of Windows Event Log SOC2 Log Tampering - Clearing of Windows Security Event Log Available for: Windows |
SOC 2 CC6.6 – Password Resets: Track password changes for awareness of compromised accounts | SOC2 - Password Change (Windows) SOC2 - Azure Password Change Available for: Windows, Azure |
SOC 2 CC6.8 – Firewall Traffic: Analyze allowed/blocked connections at perimeter | SOC2 - Allowed Firewall Traffic SOC2 - Blocked Firewall Traffic |
SOC 2 CC7.2 – IDS/IPS Alerts: Identify potential intrusion attempts and malware |
SOC2 - IDS/IPS Alerts Available for: FortiGate, SonicWall, PaloAlto, Checkpoint, Sophos XG, Umbrella |
SOC 2 PI1.1 – Account Lockouts: Find accounts locked due to excessive failed logins | SOC2 - Account Lockouts (Windows) Available for: Windows |
How Can I Access the SOC 2 Reports?
Blumira customers on paid editions can use global and saved reports to easily access SOC 2 compliance reports, as well as many other reports to analyze the logged events that you send Blumira.
To view a SOC 2 global report or one of your saved reports, follow these easy steps:
- Navigate to Reporting > Report Builder. Adjust time range as needed.
- Click View All Saved Reports, search the list, then click the name of the report you want to view.
Note: You can type a name or keyword to filter the list or scroll to find a specific report. When you search “SOC 2,” the compliance reports you can view will vary based on which integrations you currently have set up for your organization.
.png?width=512&height=446&name=unnamed%20(3).png)
Get more tips on how to use Blumira’s Report Builder in our documentation article, Using global and saved reports.
Blumira For Compliance: Easy & Effective Security For Growing Businesses
It’s easy to help meet or support multiple compliance controls using Blumira’s security operations platform. Time-strapped IT and security teams can do more with one solution that combines SIEM, endpoint visibility and XDR-integrated automated, guided, and supported response. See our blog post on NIST compliance reports and the different compliance frameworks we support.
There’s a few different ways you can get started with Blumira:
- Try XDR Edition Free – Sign up for a free 30-day trial of Blumira’s XDR edition, allowing you to get a live instance up and running to make sure our platform provides the visibility and controls you need to keep your organization running smoothly. To get started, you will need to first sign up for a free SIEM account, then go to the left menu and click Learn More > Start Free Trial to activate your XDR trial.
- See a Demo – Not ready to try Blumira yet? Watch our product demo video or contact our team to walk through a demo of Blumira’s XDR Platform to get all of your questions answered.
- Are you an MSP? Check out our MSP Program with NFR licensing for partners.
Thu Pham
Thu has over 15 years of experience in the information security and technology industries. Prior to joining Blumira, she held both content and product marketing roles at Duo Security, leading go-to-market (GTM) and messaging for the portfolio solution Cisco Zero Trust. She holds a bachelor of science degree in...
More from the blog
View All Posts
Now Available: PCI DSS Compliance Reports
Read More
Blumira's Compliance Reports: Making Audit Assessments a Breeze
Read More
Now Available: NIST Compliance Reports From Blumira
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.