Why Integrations Matter
Each integration you connect:
Automatically collects compliance evidence
Runs continuous monitoring tests
Reduces manual documentation requirements
Provides real-time visibility into control effectiveness
Maintains historical records for audit purposes
Organizations that connect integrations early typically achieve compliance 2-3x faster than those relying primarily on manual evidence collection.
Recommended First Integration: Identity Provider
Your Identity Provider (IdP) should be your first integration because it:
Provides evidence for 20-30% of typical SOC 2 controls
Enables automatic user directory synchronization
Monitors authentication and access controls continuously
Serves as a foundation for other integrations
Supported Identity Providers:
Google Workspace
Microsoft 365 / Azure AD
Connecting Google Workspace
Prerequisites
Google Workspace admin access
Permission to authorize third-party applications
Super Admin role (or delegated admin with appropriate permissions)
Setup Steps
Navigate to Integrations in the DSALTA sidebar
Find Google Workspace in the available integrations list
Click Connect
Review the permissions DSALTA will request (read-only access to user directory, group memberships, admin logs)
Click Authorize
Sign in with your Google Workspace admin account
Review and accept the permission request
You'll be redirected back to DSALTA with a success confirmation
Time to complete: 5-7 minutes
What Gets Collected
Once connected, DSALTA automatically collects:
User directory and role assignments
Group memberships
Multi-factor authentication status
Password policies and settings
Admin activity logs
Login history and suspicious activity alerts
Mobile device management status
Tests That Activate
Connecting Google Workspace immediately enables automated tests for:
MFA enforcement across the organization
Admin account monitoring
Inactive user detection
Password policy compliance
Access review requirements
Separation of duties controls
Connecting Microsoft 365
Prerequisites
Microsoft 365 Global Administrator access
Azure AD permissions
Tenant administrator rights
Setup Steps
Navigate to Integrations in DSALTA
Find Microsoft 365 or Azure AD in the list
Click Connect
Review requested permissions (user directory, groups, audit logs - all read-only)
Click Authorize
Sign in with your Microsoft admin account
Consent to the application permissions
Return to DSALTA to confirm a successful connection
What Gets Collected
DSALTA automatically monitors:
Azure AD user accounts and attributes
Security group memberships
Conditional access policies
MFA configuration and enforcement
Sign-in logs and risk detections
Admin activity through unified audit log
Device compliance status
After Connecting Your IdP
Once your identity provider is connected:
Allow 15-30 minutes for initial data collection. DSALTA needs time to:
Sync your complete user directory
Collect historical log data
Run initial test suite
Generate baseline evidence
Review test results by navigating to Compliance > Tests and filtering by your IdP integration. You'll see which tests are passing and which may need attention.
Check affected controls to see which controls now have automated evidence. Navigate to any control detail page to view the Tests tab and see automated verification.
Next Integration: Cloud Infrastructure
After your IdP, connect your primary cloud provider:
Amazon Web Services (AWS)
Monitors IAM policies, encryption settings, and logging configuration
Enables 15-25% of infrastructure security controls
Requires IAM role with read-only permissions
Google Cloud Platform (GCP)
Monitors project permissions, encryption, and audit logging
Similar coverage to AWS for infrastructure controls
Requires a service account with the viewer role
Microsoft Azure
Monitors subscriptions, resource groups, and security policies
Infrastructure control coverage comparable to AWS/GCP
Requires a service principal with reader permissions
Integration Best Practices
Connect Early: Don't wait until you're deep into your compliance program. Integrations need time to collect historical data, and some frameworks require evidence over a period (e.g., quarterly access reviews).
Review Permissions Carefully: DSALTA requests read-only access only. Review the specific permissions during authorization to understand what data is accessed.
Monitor Integration Health: Check the Integrations page regularly to ensure connections remain active. DSALTA alerts you if an integration fails or loses authorization.
Add Integrations Progressively: You don't need to connect everything on day one. Start with your IdP and cloud provider, then add development tools, monitoring systems, and communication platforms as you progress.
Common Integration Issues
Authorization Expired: If an admin revokes access or credentials change, reconnect the integration by clicking Reconnect on the integrations page.
Insufficient Permissions: Ensure the account used for authorization has appropriate admin rights. Some integrations fail if connected with accounts lacking the necessary permissions.
Data Not Appearing: Allow 30-60 minutes for initial synchronization. If data still doesn't appear, check the integration status page for error messages.
Tests Not Running: Some tests require specific data to be present. If certain tests aren't running, verify the integration has access to the necessary systems or logs.
Integration Security
All integration credentials are:
Encrypted at rest and in transit
Stored securely using industry best practices
Never shared or exposed to unauthorized parties
Regularly rotated following security best practices
Limited to read-only access (DSALTA never modifies your systems)
Viewing Integration Activity
To see what your integrations are doing:
Go to Integrations
Click on any connected integration
View Last Sync, Tests Enabled, and Evidence Collected
Review any errors or warnings in the status section
Disconnecting Integrations
If you need to disconnect an integration:
Navigate to Integrations
Find the connected integration
Click the menu icon (three dots)
Select Disconnect
Confirm the action
Note: Disconnecting removes automated monitoring and evidence collection. Existing evidence remains available, but no new data will be collected.
Next Steps
With your first integration connected:
Wait 30-60 minutes for initial data collection
Review automated test results in Compliance > Tests
Check control status improvements in your active framework
Plan your next integration based on your tech stack
Continue following the Onboarding Roadmap
Each additional integration compounds the value of DSALTA's automation, progressively reducing your manual compliance workload.


