CC6 — Logical and Physical Access Controls
CC6.1 — Logical access provisioning
| Source | API call | Refresh cadence |
|---|---|---|
| Google Workspace | admin.directory.users.list (filter on creationTime since last sync) | Every 6 hours |
| Microsoft 365 | /v1.0/users?$filter=createdDateTime ge {since} | Every 6 hours |
| Okta | /api/v1/logs?filter=eventType eq "user.lifecycle.create" | Every 6 hours |
CC6.2 — User access reviews
Codex generates a quarterly access-review snapshot:- Per user: list of apps assigned, role within each app, last activity date
- Per app: list of users with access, broken down by role
- Diff vs previous review: who was added, removed, or changed roles
CC6.3 — Role-based access enforcement
Source data:- IdP role assignments per app (via SCIM or app-specific API)
- Per-app admin/owner/member counts
- Privileged-access reports (admin role count by app, with named users)
CC6.6 — Logical access removal on termination
The control most companies fail. Codex measures the gap between HRIS termination and IdP deactivation:CC6.7 — Encryption at rest
| Asset class | Source | Evidence |
|---|---|---|
| Endpoints | MDM (Jamf, Kandji, Intune) | Per-device disk encryption status (FileVault for Mac, BitLocker for Windows) |
| Cloud storage | AWS | S3 bucket encryption configs (SSE-S3, SSE-KMS, or SSE-C) |
| Cloud storage | GCP | GCS bucket encryption config + CMEK keys |
| Cloud storage | Azure | Storage account encryption + CMK config |
| Databases | RDS / Cloud SQL / Cosmos DB | Per-instance encryption + KMS key reference |
CC6.8 — Endpoint protection
| Source | Evidence |
|---|---|
| MDM | EDR/antivirus install status, OS patch level vs latest, screen lock policy |
| CrowdStrike / SentinelOne | Per-host EDR coverage + last check-in time |
CC7 — System Operations
CC7.1 — Vulnerability management
- All findings from Snyk, Wiz, CrowdStrike, Dependabot, GHAS
- Time to triage + time to remediate per severity
- SLA compliance rates (% of High findings resolved within 30d, etc.)
CC7.2 — Security event detection
Source data: SIEM connector events (Datadog, Splunk, Sumo, New Relic). Codex pulls:- Event volume per category (auth failures, anomalous logins, privilege escalations)
- Alert rules configured + last fired
- Coverage gaps (event sources NOT being collected)
CC7.3 — Incident response
Per-incident evidence:CC7.4 — Recovery from incidents
| Source | Evidence |
|---|---|
| AWS Backup | Snapshot history per resource (RDS, EBS, EFS), retention config |
| GCP | Cloud Storage versioning + Cloud SQL backups |
| Azure | Recovery Services Vault snapshots |
| Manual | Restore-test results (you upload, Codex stores with timestamp + tester identity) |
CC8 — Change Management
CC8.1 — Change authorization
- Required reviewers met
- Branch protection rules enforced (no direct pushes to main)
- CI passed before merge