Overview
Compliance Reporting is the output layer of IGA, proving to internal and external auditors (SOX, HIPAA, GDPR, SOC 2) that controls are working. It is often the primary driver for funding IGA projects.
Effective reporting is not just about "generating PDFs." It is about having a queryable, historical record of "Who had access to What, When, and Who approved it?" The goal is to move from "Scrambling for Evidence" two weeks before an audit to "Continuous Compliance" where evidence is always available.
Architecture
Reference Pattern: The Compliance Warehouse
Operational data is ETL'd into a Warehouse to support historical trending and heavy queries without impacting the production IGA system.
Diagram
Key Decisions
| Decision | Options | Recommendation | Notes / Gotchas |
|---|---|---|---|
| Data Retention | 1 Year, 7 Years, Indefinite | 7 Years (Financial) | SOX often requires 7 years. GDPR requires minimizing retention. Balance is key. |
| Reporting Tool | IGA Native, External BI (Tableau/PowerBI) | External BI | IGA built-in reporting is usually rigid and slow. Push data to a BI tool for flexibility. |
| Evidence Format | Screenshots, Excel, Immutable Logs | Immutable Logs + PDF | Auditors mistrust Excel (editable). System-generated PDFs or direct log access is better. |
| Frequency | Ad-hoc, Scheduled | Scheduled + Self-Service | Don't be the "Report Guy." Give auditors/managers self-service access to their data. |
| Scope | All Apps, In-Scope Apps | Tiered Scope | Focus deep reporting on SOX/regulated apps. Basic reporting for the rest. |
Implementation
Phase 1: The "Must Haves" (Audit Survival)
- User Access Reviews (Who reviewed what).
- Terminated User Access (Proof of revocation).
- Admin/Privileged Access Lists.
- Goal: Pass the upcoming audit.
Phase 2: Operational Visibility
- SLA Reporting (Approval times, Provisioning errors).
- Data Quality Dashboards (Missing Managers, Orphan Accounts).
- License Usage Reports (Cost savings).
- Goal: Optimize the IGA service.
Phase 3: Predictive & Risk
- SoD Violation trending.
- Risk Score heatmaps.
- "What-if" analysis for policy changes.
- Goal: Proactive risk management.
Risks
- Data Gaps: The report says "All users revoked," but the system missed a manual account.
- Mapping Errors: The report lists "System A" but the auditor knows it as "Finance App." Naming consistency is crucial.
- Snapshot Failures: If the daily snapshot job fails, you have a gap in your historical evidence chain.
- Performance: Running a "Select All Access" query during business hours crashes the IGA system. Use a warehouse!
KPIs
- Audit Finding Count: Number of deficiencies found by auditors (Target: 0).
- Evidence Retrieval Time: Time taken to produce a requested report (Target: < 4 hours).
- Control Effectiveness: Percentage of controls (e.g., Timely Revocation) operating within tolerance.
- Data Completeness: Percentage of in-scope applications included in centralized reporting.
