When your SOC 2 auditor asks about access control evidence, open the MyCena dashboard and export the access event log for the period under review. Every CC6 and CC7 access control criterion can be evidenced from a single export. The provisioning and revocation logs together demonstrate the full user lifecycle — from authorised issuance to confirmed termination — with no gaps.
HIPAA auditors focus on three things in access control reviews: can you prove who accessed what and when, can you prove terminated employees lost access promptly, and can you prove no shared credentials exist. MyCena’s audit exports answer all three directly — without manual evidence collection. Export the access log, the workforce lifecycle log, and the revocation confirmation report for the audit period.
NIST CSF assessments score maturity against each subcategory. MyCena moves several PR.AA subcategories from “partial” or “risk informed” to “adaptive” maturity — because the controls are architectural, not procedural. When presenting to an assessor, lead with the structural argument: MyCena does not add a policy around credential management, it removes credentials from user possession entirely. That distinction moves the maturity needle more than any compensating control.
Data Protection Officers and supervisory authorities focus on three questions in access control reviews: do you know who had access to personal data and when, can you demonstrate that access ended when it should have, and what would you be able to tell a regulator within 72 hours of a breach? MyCena answers all three from the same audit export.
DORA supervisors and internal audit functions focus on two things in access control reviews: can the entity demonstrate that ICT access rights are managed systematically, and can the entity demonstrate that third-party access ends when contracts end. Lead with the third-party access report — it shows every active vendor credential, its scope, and its revocation status, which is the exact evidence DORA Article 28 reviews are looking for.
ISO 27001 certification auditors review both documentation and evidence of implementation. For access control controls — A.5.15 through A.5.18 — the most common finding is the gap between documented policy and demonstrated practice. MyCena closes that gap: the policy is enforced by the platform’s provisioning workflow, and the audit log demonstrates it has been enforced for every access event in the audit period.
PCI DSS QSAs assess both the design and operating effectiveness of controls. The most common findings in Requirement 7 and 8 reviews are shared accounts, delayed offboarding, and the inability to demonstrate that terminated users lost access promptly. MyCena provides structural evidence for all three: the unique user access log demonstrates no sharing, the revocation log with timestamps demonstrates prompt termination, and the CDE access audit log supports Requirement 10 evidence collection.
CMMC assessors evaluate both the existence and operation of practices across all 14 domains. The Access Control domain — 22 practices at Level 2 — is the most commonly deficient in self-assessments and third-party assessments alike. MyCena addresses the AC domain practices most frequently cited as deficient: credential sharing, lack of least privilege enforcement, failure to revoke access promptly, and absence of a complete audit trail. When preparing a System Security Plan (SSP) and Plan of Action and Milestones (POA&M), MyCena’s access log and credential scope records provide the artefacts an assessor needs. Lead with these in your evidence package.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
Ce site utilise Google Analytics pour collecter des informations anonymes telles que le nombre de visiteurs du site et les pages les plus populaires.
Garder ce cookie activé nous aide à améliorer notre site Web.