← Back to all integrations
Monitor your managed devices and ensure correct security settings.
InstallInstall

Jamf

Integrating with JAMF enables you to keep track of your devices, their security, and take action when there are changes.

Jamf automatically associates devices to the workforce member that uses it as well as checks that devices have disk encryption and automatic updates enabled.

Automate Asset Inventories

By integrating with JAMF, you'll quickly create an inventory of all your JAMF-managed devices (laptops, phones, etc.). Also, Comply uses the email on the Jamf device to automatically associate it to the workforce member that uses it if they're tracked in your asset inventory.

Automate Procedures for devices change

Use procedures to automatically trigger ticket creation and task assignment when devices are added or removed from JAMF.

Automate Evidence Collection

Device Security Settings

When syncing your devices, we automatically check them for secure settings. See the Checks section below for more details.

Disk Encryption

Every month, Comply will scan your devices to check them for disk encryption settings. See the Checks section below for more details.

Automatic Updates

Every month, Comply will scan your devices to check them for automatic updates settings. See the Checks section below for more details.

Automations

Disk Encryption

Ensures that all boot partitions are encrypted for computers managed in JAMF as part of a Computer Config Scan.

  • A.10.1.1
  • CC6.1
  • CC6.7
  • 164.310(c)
  • 164.312(a)(2)(iv)
  • 164.312(e)(2)(ii)

How to use Aptible and Jamf

  • Automatically delegate onboarding and offboarding tasks to relevant asset owners as device statuses change in Jamf.
  • Keep your asset inventory up to date with real-time updates as you add devices to Jamf
  • Get notifications when changes in security settings, update settings, and disk encryption settings on your devices put them at odds with your policies.
Assets synced
  • Devices
Domains Automated
  • Mobile Device Management
Frameworks Automated
ISO 27001:2013
SOC 2
HIPAA
Requirements Automated
A.10.1.1
ISO 27001:2013
Policy on the use of cryptographic controls
A policy on the use of cryptographic controls for protection of information shall be developed and implemented.
CC6.1
SOC 2
Logical and Physical Access Controls
The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.
CC6.7
SOC 2
Logical and Physical Access Controls
The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives.
164.310(c)
HIPAA
Standard: Workstation Security (R)
Implement physical safeguards for all workstations that access electronic protected health information, to restrict access to authorized users.
164.312(a)(2)(iv)
HIPAA
Encryption and Decryption (A)
Implement a mechanism to encrypt and decrypt electronic protected health information.
164.312(e)(2)(ii)
HIPAA
Encryption (A)
Implement a mechanism to encrypt electronic protected health information whenever deemed appropriate.
Integration scopes
  • Level: Service Account
  • Permissions: Read Only