just got put in charge of SOC2 compliance at my company, trying to get ahead of the credential generation piece before it bites us

Posted by Fresh-Obligation6053@reddit | sysadmin | View on Reddit | 17 comments

previous role I was just implementing stuff, now I'm the one who has to make sure we can actually prove it during an audit and its a different feeling lol

first thing I'm trying to nail down is credential generation evidence because I've seen it catch people off guard. we generate correctly, right functions, complexity enforced, but I have no idea if we could actually show an auditor what entropy settings ran on a specific credential six months ago across all our environments

don't want to be the person scrambling to reconstruct evidence two weeks before the audit

for people who have been through this what are you actually using to capture generation time evidence? built something internal, leaning on your secrets manager, third party tool?

also what killed you during the audit that you didn't see coming, and what do you wish you had set up way earlier

trying to avoid as much drama as possible before we get there