Unencrypted Storage

Table of Contents

To comply with SOC 2, businesses need to encrypt all data storage. However, in large organizations, it can be difficult to find and audit all data storage.

Lucidum ingests data from all the solutions in your environment. Lucidum Machine Learning algorithms then enrich the ingested data through deduplication, triangulation, and aggregation. This allows Lucidum to discover every asset and every account and user, even those not discovered by your security solutions, so you can successfully comply with SOC 2.

Asset Encryption Tracking #


This dashboard shows which data storage is encrypted and which data storage is not encrypted. This dashboard also provides details about unencrypted data storage.

This dashboard includes charts for:

  • Unencrypted Assets. Displays unencrypted assets by asset type.

  • Encrypted Assets. Displays encrypted assets by asset type.

  • User Assets Missing Full Disk Encryption. Displays unencrypted assets associated with users (usually laptops or personal computers).

  • Unencrypted Assets by Location. Displays unencrypted assets by location.

  • Unencrypted Assets by Manager. Displays unencrypted assets by manager name.