Documentation
Solutions Guide

Compliance

Meet regulatory requirements with built-in controls, comprehensive audit trails, and automated compliance reporting for SOC 2, HIPAA, PCI DSS, and more.

Estimated time: 30 minutes

Compliance Controls

Audit Logging

Complete audit trail for all access events

Access Control

RBAC with just-in-time access

Session Recording

Record and replay privileged sessions

Certifications

Pre-built compliance report templates

Supported Frameworks

SOC 2 Type II

CC6.1CC6.2CC6.6CC7.1CC7.2

HIPAA

164.308(a)(3)164.312(a)(1)164.312(b)164.312(d)

PCI DSS v4

8.2.28.3.110.210.310.7

ISO 27001

A.9.1A.9.2A.9.4A.12.4

GDPR

Art. 25Art. 32Art. 33Art. 35

FedRAMP

AC-2AC-3AC-17AU-2AU-3

Configuration Steps

1

Enable Session Recording

Record all privileged access sessions for audit.

tacctl create -f - <<EOF
kind: session_recording_config
metadata:
  name: compliance
spec:
  mode: strict
  storage:
    type: s3
    bucket: compliance-recordings
  retention:
    default: 365d
    pci_scope: 7y
EOF
2

Configure Audit Logging

Enable comprehensive audit logging for all events.

tacctl create -f - <<EOF
kind: audit_config
metadata:
  name: compliance
spec:
  audit_events_uri:
    - s3://audit-logs/tigeraccess
    - syslog://siem.company.com:514
  audit_table_name: tigeraccess_audit
  retention: 7y
EOF
3

Set Up Access Reviews

Configure periodic access certification campaigns.

tacctl create -f - <<EOF
kind: access_list
metadata:
  name: quarterly-review
spec:
  title: "Quarterly Access Review"
  audit:
    frequency: quarterly
    next_audit_date: "2025-03-31"
  owners:
    - name: security-team
  notifications:
    start: 14d
    reminder: 7d
EOF
4

Generate Compliance Reports

Create reports for your compliance framework.

# Generate SOC 2 report
tac compliance report soc2 --period=Q4-2024

# Generate HIPAA access report
tac compliance report hipaa --period=2024

# Export audit logs for review
tac audit export --from=2024-01-01 --to=2024-12-31

Compliance Ready

With TigerAccess compliance features configured, you have:

  • Complete audit trail for all access events
  • Tamper-proof session recordings
  • Automated access certification reviews
  • Pre-built compliance reports for auditors