Audits
Citadel performs audits, verifying compliance regarding device configuration or password policies. Each audit has one or more controls, that each have a status:
UNKNOWN: the control could not be verifiedPASSING: the control is working and safeFAILING: the control is not nominal, but there is no immediate riskWARNING: the control is unsafe, action needs to be plannedBLOCKING: the control is unsafe, immediate action is required
All controls and audits are aggregated and the “worst” control defines the state of your device.
gradual escalation
In order to allow users time to react, to prevent blocking them when they are performing time-critical tasks, and to ensure that notifications and access restrictions are commensurate with the information security risk, Citadel applies a gradual escalation mechanism.
FAILING: user is notified, reminded periodicallyWARNING: user is warned access will be cut unless action is takenBLOCKING: user is told access will be restored once the control is restored
You can set for each control different maximum escalation levels and delays between steps, in order to adapt Citadel to your context and risks.
The delay between steps is in worked days and only takes into account the days that the user is active. If a user has a failing control and is absent from work for two weeks (without using the device) Citadel does not take this period of absence into account.
Notifications and warnings are given to the user via OS-level notifications and modal windows that are injected in the pages of the protected scope. When the user clicks on the notification, the user is shown the dashboard to show them the controls that are non-compliant.