This guide maps Delinea's Privileged Access Management settings directly to AICPA Trust Service Criteria controls — giving you the exact configuration steps and evidence artefacts your external auditors will request.
Work through each tab in order. The Checklist tab contains every configuration item you need to verify or enable in Delinea Secret Server or Privileged Behaviour Analytics. Check items off as you complete them — your progress is tracked automatically. The Controls Map cross-references each setting to its specific Trust Service Criteria sub-criterion. The Audit Reports tab shows how to generate the evidence packages your auditors will request.
Admin → Users & Groups → Roles and audit all existing roles.Auditor, Secret Owner, Help Desk, Administrator.Admin → Configuration → Login.Require Two Factor Authentication to Yes for all users.Admin → Users, verify no accounts have MFA exemptions (check Two Factor column).30 days.90 days (or via RPC heartbeat on change).60 days.Admin → Secret Templates, open each template, click Security, set Expiration Enabled to Yes and enter the interval.Admin → Secret Policy, create or edit the policy applied to privileged-account secrets.Check Out Enabled = Enforced.Change Password on Check In = Enforced (rotates immediately after each use).Check Out Interval — recommend 2 hours for human access, 8 hours for automated scripts with approval.Folder → Edit → Secret Policy.Requires Approval For Access = Enforced.Approvers — assign the Secret Owner group or a named manager account.Allow Emergency Access with a 15-minute time limit and mandatory reason field.Admin → Configuration → Session Recording.Enable Session Recording = Yes.Record Session in the Launcher settings tab.Session Recording = Enforced to all production server Secrets.Reports → User Audit → Users With Roles, export to CSV.Reports → Secret Access → Secrets by User, export to CSV.Admin → Directory Services → Active Directory and enable synchronisation.15 minutes (or real-time via ILM connector).Sync Options, enable Disable users in Secret Server when disabled in Active Directory.16 characters.Yes.5 attempts.30 minutes (or require admin unlock).24 passwords cannot be reused.Admin → Configuration → Application Settings.Detailed Audit Log = Yes.365 days (SOC 2 Type II requires the full observation period plus buffer).Admin → Configuration → Security → Syslog/SIEM.Security Events, Secret Activity, System Log.Admin → Privileged Behaviour Analytics → Configuration.Unusual Secret Access Volume — alert if a user views >20 secrets in 1 hour.After-Hours Access — alert on access outside 07:00–19:00 local time.Access from New IP — alert when a known user logs in from an unrecognised IP range.Admin → Secret Templates, select each active template (Windows, Unix, SQL, etc.).Heartbeat Enabled = Yes.4 hours for privileged accounts, 24 hours for service accounts.Admin → Configuration → Email → Heartbeat Failure.Unix Account (SSH Key Rotation) template in Secret Server.Key Rotation Enabled = Yes with a 90-day rotation schedule.Admin → Discovery → Discovery Sources and configure an Active Directory source for your domain.Discovery → Unmanaged Accounts report and onboard or document justification for each unmanaged account.Admin → Event Subscriptions → Discovery Account Found.Admin → Backup and enable Automatic Backup.Daily with a nightly window (e.g., 02:00).Admin → Event Subscriptions → Create Subscription.Configuration Changed, Role Created/Modified/Deleted, User Created/Deleted.Secret Policy Changed, Folder Permission Changed, Secret Deleted.SVC_DelineaSSPM, in a protected OU.Read all properties, Reset Password, Write lockoutTime on the target OUs only.Admin → Configuration → Security → IP Address Restrictions.Restrict to Allowlisted IPs Only and test from both an allowed and a blocked IP.Admin → Users → Application Accounts.Token Authentication with a short token expiry (30–60 minutes) where the integration supports it.TLS 1.0 and TLS 1.1 on the Secret Server host.Admin → Configuration → Security → Encryption to confirm the Master Key is stored on a Hardware Security Module (HSM) or in DPAPI — not in the file system.| Criteria | Sub-Control | Delinea Setting | Module / Path | Priority |
|---|---|---|---|---|
| CC6.1 | Logical access controls — provisioning based on least privilege | Role-Based Access Control (RBAC) | Admin → Users & Groups → Roles | Required |
| CC6.1 | Authentication — credentials issued to authorised identities | Multi-Factor Authentication (MFA) | Admin → Configuration → Login | Required |
| CC6.1 | Credential lifecycle — expiry and rotation of privileged credentials | Secret Expiry & Auto-Rotation | Admin → Secret Policy → Expiration | Required |
| CC6.2 | Access removal — timely de-provisioning upon role change or departure | AD Sync — Disable on AD Disable | Admin → Directory Services → AD | Required |
| CC6.2 | Periodic access review — recertification of access entitlements | User Access Review Reports | Reports → User Audit | Required |
| CC6.3 | Authorisation — access approved by authorised personnel | Approval Workflows | Admin → Secret Policy → Approval | Required |
| CC6.3 | Segregation of duties — single-user credential checkout | Secret Checkout (Exclusive) | Admin → Secret Policy → Check Out | Required |
| CC6.6 | Network access — restriction to authorised network paths | IP Address Allowlisting | Admin → Configuration → Security | Recommended |
| CC6.6 | Authentication — brute-force protection | Account Lockout Policy | Admin → Configuration → Login | Required |
| CC6.8 | Monitoring — detection of unauthorised access attempts | Session Recording (RDP/SSH) | Admin → Configuration → Session Recording | Required |
| CC7.1 | System configuration — management of technical vulnerabilities | Heartbeat Monitoring | Admin → Secret Templates → Heartbeat | Required |
| CC7.1 | System configuration — discovery of unmanaged accounts | Account Discovery Scanning | Admin → Discovery → Sources | Required |
| CC7.1 | SSH key management — rotation of cryptographic credentials | SSH Key Rotation | Admin → Secret Templates → SSH Key | Recommended |
| CC7.2 | Anomaly detection — identification of abnormal system activity | Privileged Behaviour Analytics | Admin → PBA → Configuration | Required |
| CC7.2 | Centralised monitoring — SIEM event forwarding | Syslog / CEF SIEM Integration | Admin → Configuration → Security → SIEM | Required |
| CC7.2 | Audit logging — complete event audit trail | Detailed Audit Log (365-day) | Admin → Configuration → App Settings | Required |
| CC7.3 | Change detection — alerting on unauthorised configuration changes | Event Subscriptions (Config Changed) | Admin → Event Subscriptions | Recommended |
| CC7.4 | Backup & recovery — tested restore procedures | Automatic Backup Configuration | Admin → Backup | Required |
| CC9.1 | Vendor risk — management of third-party system integrations | Application Account Register | Admin → Users → Application Accounts | Required |
| CC9.1 | Least-privilege vendor access — scoped service account permissions | Service Account AD Delegation | Active Directory Delegation Control | Required |
| CC9.2 | Encryption in transit — modern TLS for all communications | TLS 1.2+ Enforcement | IIS / Windows Registry / Group Policy | Required |
| CC9.2 | Encryption at rest — master key management and HSM usage | Encryption Key Management (HSM) | Admin → Configuration → Security → Encryption | Recommended |
Reports → User Audit → Users with RolesExport → CSV CSVReports → Groups → Group Memberships and exportReports → Secret Access → Secret ActivityCSV CSV and also to PDF PDF for auditor reading copyFinancial SystemsAdmin → Session Monitoring → View SessionsCSV CSVReports → Password Compliance → Last ChangedReports → Heartbeat → Heartbeat Status and exportCSV CSVHeartbeat Failed accounts with remediation timestampsAdmin → Discovery → Discovery ResultsAll Discovered Accounts list (managed and unmanaged)CSV CSV; include: Account, Host, Status (Managed/Unmanaged), Last DiscoveredAdmin → Configuration → System LogConfiguration, Role, and SecurityCSV CSV for the full observation periodAdmin → Privileged Behaviour Analytics → AlertsCSV CSVAdmin → Users → All Users and export user list to CSV CSVTwo Factor Authentication column — filter for None values/Evidence/CC6/, /Evidence/CC7/, /Evidence/CC9/. Within each, sub-folder by report name with date-stamped filenames (e.g. UserAccessReport_2025-09-01_to_2026-03-01.csv). Include a master index spreadsheet mapping each evidence file to the specific TSC sub-control it satisfies.