Skip to main content

Onboarding to ComplyJet

Set up your compliance program in minutes by connecting key systems across Engineering, IT, HR, and Risk.

Upendra Varma avatar
Written by Upendra Varma
Updated over a week ago

Welcome to ComplyJet! This quick onboarding flow helps you set up the key systems your compliance program depends on. It takes just a few minutes to complete, and once you're done, ComplyJet will start guiding you through the rest of your compliance journey.

1. Choose Your Compliance Goals

Start by selecting the security framework you'd like to follow — such as SOC 2 or ISO 27001. This choice defines the structure of your program, including the controls and requirements you'll need to address.

You can begin with just one framework and add more later as your needs evolve. Once you've made your selection, click Next to continue.

2. Engineering Program

In this step, you'll tell ComplyJet where your infrastructure and source code are hosted. Select your cloud provider — AWS, Azure, or GCP — depending on where your systems run.

You’ll also be prompted to choose your code hosting provider, like GitHub, GitLab, or Bitbucket. This allows ComplyJet to scan for best practices like branch protection, code review workflows, and more.

3. IT Program

Now it’s time to connect your Mobile Device Management (MDM) provider. This ensures that all company devices meet basic security requirements — like password protection, encryption, and inactivity timeouts.

Supported providers include Hexnode, Kandji, Swif, and Microsoft Intune. Once connected, ComplyJet can begin checking device-level compliance automatically.

4. HR Program

This step focuses on how your team accesses tools and systems. Select the Identity Provider (IdP) your company uses — such as Google Workspace, Office 365, Okta, or OneLogin.

ComplyJet uses this connection to monitor authentication settings, enforce single sign-on (SSO), and track active/inactive users across your organization.

5. Risk & Security Program

Finally, define your risk program. We recommend selecting the “Normal” mode, which covers around 10–12 common scenarios and provides balanced coverage without overcomplication.

If you use a vulnerability scanner (like AWS Inspector, Tenable, or Snyk), you can connect it here to start pulling in real-time security insights.

You're Ready to Go!

Once you've completed all five steps, ComplyJet will create a customised compliance program for your organisation. You can then go to Dashboard, where you can view progress, complete tasks, and track readiness in real time.

And of course, if you get stuck, our support team is here to help anytime.

Did this answer your question?