Audit Playbook: Continuous Application Inventory Reporting

What Auditors Want to See

Purpose

Auditors require verifiable proof of who accessed what, when, and why across all applications subject to compliance mandates.

Traditional IAM/IGA tools cover only managed apps, leaving unmanaged, on-prem, and shadow applications invisible. Orchid uniquely discovers in-scope applications, evaluates their identity controls, and generates continuous, compliance-mapped evidence.

Customer Satisfaction Survey 2023

This report summarizes the findings from our annual customer satisfaction survey conducted in 2023. The survey aimed to gather feedback on our products and services to enhance customer experience.

Survey Results

We received responses from over 1,000 customers, with a satisfaction rate of 85%. Key areas of feedback included:

  • Product Quality
  • Customer Service
  • Delivery Timeliness

Based on the feedback, we are implementing several improvements to address customer concerns and enhance our offerings.

Quick Checklist

  • Scope, baselines and owners.
  • Complete application inventory (managed + unmanaged).
  • Identity lifecycle records (joiner, mover, leaver).
  • Authentication logs (success, failure, session termination).
  • Access governance evidence (least privilege, SoD, privilege elevation).
  • Overlay risk exposure tracked (orphan, local, shadow, stale accounts).
  • Dashboards, reports and evidence prepared for auditor review.

See Orchid
in Action Today

Maintain Strong and Consistent Posture Across all Self-Hosted and SaaS Applications

© 2025 All Rights Reserved, Orchid.