kate-gibson

724 Docs

Data Classification and Handling

Last Updated: September 26, 2025

Category Requirement CSCC SAMA CSF ECC-1 Data Classification & Handling All data assets and all IT assets are categorized in accordance with applicable statutory, regulatory, and contractual requirements 2-6-1-2 2-1-5 2-7-3-2 4-2-3-1 Lucidum discovers every asset and every account in your environment, even those not discovered by your security solutions. Lucidum uses proprietary rule-based algorithms...

Endpoint Security

Last Updated: September 26, 2025

Category Requirement CSCC SAMA CSF ECC-1 Asset Management Accurately Inventory and Identify IT Assets to implement and manage asset security controls. 2-1 2-5 3.3.3 2-1-1 2-1-2 2-6-1 2-6-2 2-6-4 Lucidum can help you accurately Inventory and identify assets and implement and manage asset security controls. After Lucidum ingests data from your security solutions, Lucidum uses...

Identification and Authentication

Last Updated: September 26, 2025

Category Requirement CSCC SAMA CSF ECC-1 Identification & Authentication Identify users and the assets and data to which they have access 2-2 2-2-1-5 3.3.5 2-2-1 2-2-2 2-2-4 Lucidum includes native features that help with identity management, such as: assets, users, and their relationships zombie users users not using MFA users not properly offboarded This chapter...

Incident Response

Last Updated: February 9, 2026

Category Requirement CSCC SAMA CSF ECC-1 Incident Response Provide detailed reports on assets associated with incidents, prioritize incidents for mitigation, and automate mitigation tasks such as analysis, containment, patching, and changes to configuration. 3.3.15 2-13-1 2-13-2 2-13-3 2-13-3-2 2-13-4 Lucidum can help you identify assets associated with incidents, prioritize incidents for mitigation, and automate mitigation...

Threat Management

Last Updated: February 9, 2026

Category Requirement CSCC SAMA CSF ECC-1 Threat Management Threat intelligence that includes cross-organization visibility and information-sharing to inform the development of system and security architectures, selection of security solutions, monitoring, threat hunting, and response and recovery activities. 3.3.16 2-10-4 2-13-1 2-13-2 2-13-3 2-13-4 Lucidum can help you manage threats across your organization and help you...

Identity and Access Management

Last Updated: September 25, 2025

Managing user access is the first line of defense against cyber attacks. These use cases show how Lucidum can help you manage: Users who do not use IAM Root accounts that are not management with Privileged Access Management (PAM) Users who do not use MFA Users who do not use VPN Find Users Who Do...

Microsoft Defender Missing

Last Updated: September 25, 2025

Lucidum can help you accurately identify assets that are not running Microsoft Defender for Endpoint. Endpoint security is an important part of an organization’s security posture. Ideally, all endpoints in your environment run an endpoint security solution. After Lucidum ingests data from your security solutions, Lucidum uses graph data, machine learning, and predictive analytics to...

Unencrypted Storage

Last Updated: September 25, 2025

To comply with SOC 2, businesses need to encrypt all data storage. However, in large organizations, it can be difficult to find and audit all data storage. Lucidum ingests data from all the solutions in your environment. Lucidum Machine Learning algorithms then enrich the ingested data through deduplication, triangulation, and aggregation. This allows Lucidum to...

Zombie Users and Improper Offboardings

Last Updated: September 26, 2025

Zombie users are those users who are using applications in your environment but are not managed in directory services. Zombie accounts have no verifiable owner. Zombie accounts are particularly challenging for businesses that have had layoffs, have frequent transfers within the company, use contractors, do seasonal hiring, and use interns. Zombie accounts leave your business...

Sending Lucidum Data to Microsoft Sentinel

Last Updated: September 25, 2025

In this use case, we will use the Sentinel Action to send data to a data lake on Sentinel. This is also known as running Lucidum “headless”, because Sentinel users do not have to interact with Lucidum to use the data from Lucidum. Suppose that every day, you want to send a list of newly...