Skip to main content

How Integrations Work

DSALTA connects to your existing tools to automatically collect compliance evidence. When you connect an integration, DSALTA performs the following:
1

Pulls access data

Every integration provides user accounts, roles, and permissions — feeding the Access module for automated access reviews.
2

Pulls module-specific data

Depending on the integration type, DSALTA also pulls infrastructure inventory, code changes, vulnerability findings, incident data, and more.
3

Runs automated tests

DSALTA generates system tests specific to each integration. For example, “MFA enabled for all users” for identity providers, or “S3 buckets encrypted” for AWS. Tests run automatically on a schedule.
4

Syncs continuously

Data syncs on a schedule (hourly, daily, or webhook-based depending on the integration). Every record includes a source field showing which integration provided it.

Key Principles

Read-Only Access

DSALTA uses read-only API permissions. We never modify, delete, or create resources in your connected systems.

Evidence Collection

Every data point pulled from an integration serves as audit evidence with timestamps and source attribution.

Automatic Test Generation

When you connect an integration, DSALTA automatically generates the relevant compliance tests. No manual configuration is needed.

Manual + Automated

Integration data and manual entries coexist in the same tables. Auditors see both — integration-sourced records show the integration name, while manual records show “Manual.”

Data Library Modules

Each integration feeds one or more modules in the DSALTA Data Library:
ModuleWhat It ContainsFed By
AccessWho has access to what across all systemsAll integrations
PeopleEmployee directory, policy approvals, trainingIdentity providers, HRMS
InventoryServers, databases, repos, SaaS tools, devicesCloud providers, hosting platforms
VulnerabilitiesCVEs, security findings, SLA trackingVulnerability scanners, cloud security, GitHub
IncidentsSecurity incident lifecycle trackingMonitoring tools, cloud providers
ChangesChange management with approval workflowsProject management tools, ticketing
Code ChangesPull requests, code reviews, CI checksCode repositories (read-only)
DevicesCompany devices, OS, encryption, screen lockMDM platforms, endpoint security
TestsAutomated compliance checks (pass/fail)Generated by all integrations

Integration Categories

Identity Providers

Google Workspace, Microsoft Entra ID, Okta, JumpCloud, OneLogin

Cloud Infrastructure

AWS, GCP, Azure, DigitalOcean, Heroku, Netlify

Code Repositories

GitHub, GitLab, Bitbucket, Azure DevOps

Security & Monitoring

Qualys, Wiz, Microsoft Defender for Endpoint, Datadog, Grafana, Sentry, Cloudflare

Databases

MongoDB Atlas, Snowflake

SaaS & Productivity

Slack, Asana, Linear, Trello, Figma, HubSpot, Salesforce, Zoom, Box, Intercom
All integrations use read-only API access. DSALTA never modifies your systems. Data is encrypted in transit (TLS 1.3) and at rest (AES-256).