Documentation

    Technical guides, API references, and implementation playbooks for deploying QuantLayer across enterprise IT, industrial OT, and IoT environments.

    Getting Started

    Quickstart

    QuantLayer Console Overview

    Navigate policies, trust posture, identity inventory, and events across cloud, on-prem, and edge.

    PlatformUI
    Deployment

    Deployment Models: Cloud, On-Prem, Hybrid, Edge

    Reference topologies and guidance for industrial sites, data centers, and distributed IoT fleets.

    ArchitectureOT/ICSEdge

    Implementation Guides

    Identity

    Passwordless Authentication & Immutable Identity

    Configure cryptographic identity verification for workforce, machines, and workloads.

    IdentityMFA/Passwordless
    OT

    Industrial Segmentation Playbook

    Define zones/conduits, apply least privilege, and stage enforcement without downtime.

    MicrosegmentationIEC 62443
    IoT

    Secure Device Onboarding & Fleet Trust

    Provision device identity, rotate keys, attest posture, and monitor trust drift at scale.

    Device TrustEdgeIoT
    Protocols

    Industrial Protocol Support (50+)

    Decode industrial protocol intent, map sessions to immutable identity, and enforce Zero Trust responses across OT, IT, and IoT.

    ProtocolsOT/ICS

    NIST Zero Trust Architecture

    NIST ZTA

    NIST SP 800-207 Mapping to QuantLayer

    Map Policy Engine/Administrator/Enforcement Points and telemetry loops to QuantLayer’s control plane and enforcement.

    NISTZTAArchitecture
    Decision Flow

    Zero Trust Decision Flow

    Signals → risk scoring → policy decision → enforcement → immutable evidence. The operational loop that makes Zero Trust measurable.

    TelemetryRiskEvidence
    Access

    Least Privilege Access Model

    Model subjects, resources, actions, and context; implement deny-by-default with safe exceptions.

    Least PrivilegePolicy

    IEC 62443 for OT/ICS

    IEC 62443

    IEC 62443 Alignment Guide

    A practical roadmap from CSMS governance to zones & conduits to technical controls and audit evidence.

    OT/ICSCompliance
    System Design

    Zones & Conduits

    Model segmentation boundaries and controlled communication paths, then enforce them safely in production.

    SegmentationOT-Safe
    Assurance

    Security Levels (SL)

    Define SL-T targets per zone, validate SL-C capability, and measure SL-A achieved posture continuously.

    RiskEvidence
    Governance

    CSMS (IEC 62443-2-1)

    Build an OT cybersecurity management system with incident response, audits, and continuous improvement.

    CSMSAudit
    Operations

    Patch & Vulnerability Management

    Baseline versions, prioritize risk, and perform OT-safe remediation with auditable change control.

    MaintenanceOT
    Technical Controls

    Foundational Requirements (FR 1-7)

    Map each Foundational Requirement to QuantLayer controls, deployment patterns, and audit evidence.

    FR 1-7ControlsOT/ICS
    Supplier Assurance

    Secure Development (IEC 62443-4-1)

    Use IEC 62443-4-1 SDL requirements for procurement and assurance of IACS components.

    SDLProcurement
    Components

    Component Requirements (IEC 62443-4-2)

    Technical requirements for embedded, host, network, and application components—mapped via FR 1–7.

    4-2FR Mapping

    Policies & Enforcement

    Policies

    Zero Trust Policies

    Create, stage, simulate, and enforce policies across IT/OT/IoT with operational safety.

    PoliciesEnforcement
    AI

    AI-Based Policy Generation

    Generate policy drafts from intent + telemetry, simulate outcomes, and apply guardrails before enforcement.

    AISimulationGuardrails

    Threats, Events & Response

    SOC

    Events & Incident Response

    Correlate identity + device + network signals, quarantine compromised assets, and capture evidence.

    SOCIncidentsEvidence

    Integrations, Compliance & API

    Integrations

    Integrations (SIEM/SOAR, IAM, EDR, MDM, CMDB)

    Connect QuantLayer signals and actions to your security stack and workflows.

    SIEMSOARIAMEDR
    Governance

    Compliance & Reports

    Generate audit-ready evidence packs with immutable logs, posture history, and enforcement traceability.

    ComplianceReportsEvidence
    API

    API Overview

    Authentication, event queries, policy automation, and evidence export patterns.

    APIAutomation
    Help

    Troubleshooting & FAQ

    Common setup issues, policy rollout safety tips, and OT-friendly guidance.

    FAQTroubleshooting
    Concepts

    Core Concepts

    Identity, trust posture, signals, enforcement, segmentation, and evidence—your foundation for Zero Trust.

    ConceptsZTA
    Quickstart

    First 30 Minutes: From Enrollment to Enforcement

    Enroll → verify trust → generate policy → simulate → enforce → review evidence.

    QuickstartPoliciesEvents

    Need Implementation Help?

    Our security architects can help you design and deploy Zero Trust across your environment.

    Talk to an Expert