- Documentation
- Security Audit Guide
Security Audit Guide
Comprehensive documentation for BuildForce security scans, compliance frameworks, and security best practices for your SaaS platforms.
What We Scan
BuildForce performs comprehensive security analysis across five key areas.
User Access & Permissions
Audit user permissions, profile settings, and role hierarchies for least-privilege compliance.
Authentication & Session
Review authentication settings, password policies, and session security configurations.
Data Access & Sharing
Analyze sharing settings, field-level security, and data exposure risks.
API & Integration Security
Monitor connected apps, API usage, and external integrations for security compliance.
Audit Trail & Monitoring
Verify audit logging configuration and event monitoring settings.
Compliance Frameworks
BuildForce maps security findings to major compliance frameworks for audit readiness.
SOC 2 Type II
Service Organization Control 2 - Trust Service Criteria for security, availability, and confidentiality.
Controls Mapped:
HIPAA
Health Insurance Portability and Accountability Act - PHI protection requirements.
Controls Mapped:
GDPR
General Data Protection Regulation - EU data protection and privacy requirements.
Controls Mapped:
PCI DSS
Payment Card Industry Data Security Standard - Cardholder data protection.
Controls Mapped:
Security Best Practices
Recommended security configurations based on industry standards.
Enforce MFA for All Users
CriticalMulti-factor authentication should be required for all users, especially those with admin access.
Review Permissions Quarterly
HighConduct quarterly access reviews to ensure permissions align with current job responsibilities.
Restrict API Access
HighOnly enable API access for users and integrations that require it. Remove unnecessary access.
Configure Session Timeouts
MediumSet appropriate session timeout values based on data sensitivity. 15-30 minutes for sensitive orgs.
Enable Field Audit Trail
MediumTrack changes to sensitive fields for compliance and forensic purposes.
Review Sharing Rules
HighEnsure sharing rules follow least-privilege principles. Avoid org-wide public access.
Audit Reporting
Generate compliance-ready reports for auditors and stakeholders.
Executive Summary
High-level security posture overview with risk scores, trending data, and key recommendations for leadership.
Detailed Findings
Comprehensive listing of all security findings with severity, affected resources, and remediation guidance.
Compliance Mapping
Findings mapped to specific compliance controls for SOC2, HIPAA, GDPR, and other frameworks.
Remediation Tracker
Track remediation progress over time with evidence collection for audit documentation.
Ready to Assess Your Security Posture?
Run a comprehensive security audit on your org. Identify vulnerabilities and compliance gaps in minutes.