Documentation
Technical guides, API references, and implementation playbooks for deploying QuantLayer across enterprise IT, industrial OT, and IoT environments.
Getting Started
QuantLayer Console Overview
Navigate policies, trust posture, identity inventory, and events across cloud, on-prem, and edge.
Deployment Models: Cloud, On-Prem, Hybrid, Edge
Reference topologies and guidance for industrial sites, data centers, and distributed IoT fleets.
Implementation Guides
Passwordless Authentication & Immutable Identity
Configure cryptographic identity verification for workforce, machines, and workloads.
Industrial Segmentation Playbook
Define zones/conduits, apply least privilege, and stage enforcement without downtime.
Secure Device Onboarding & Fleet Trust
Provision device identity, rotate keys, attest posture, and monitor trust drift at scale.
Industrial Protocol Support (50+)
Decode industrial protocol intent, map sessions to immutable identity, and enforce Zero Trust responses across OT, IT, and IoT.
NIST Zero Trust Architecture
NIST SP 800-207 Mapping to QuantLayer
Map Policy Engine/Administrator/Enforcement Points and telemetry loops to QuantLayer’s control plane and enforcement.
Zero Trust Decision Flow
Signals → risk scoring → policy decision → enforcement → immutable evidence. The operational loop that makes Zero Trust measurable.
Least Privilege Access Model
Model subjects, resources, actions, and context; implement deny-by-default with safe exceptions.
IEC 62443 for OT/ICS
IEC 62443 Alignment Guide
A practical roadmap from CSMS governance to zones & conduits to technical controls and audit evidence.
Zones & Conduits
Model segmentation boundaries and controlled communication paths, then enforce them safely in production.
Security Levels (SL)
Define SL-T targets per zone, validate SL-C capability, and measure SL-A achieved posture continuously.
CSMS (IEC 62443-2-1)
Build an OT cybersecurity management system with incident response, audits, and continuous improvement.
Patch & Vulnerability Management
Baseline versions, prioritize risk, and perform OT-safe remediation with auditable change control.
Foundational Requirements (FR 1-7)
Map each Foundational Requirement to QuantLayer controls, deployment patterns, and audit evidence.
Secure Development (IEC 62443-4-1)
Use IEC 62443-4-1 SDL requirements for procurement and assurance of IACS components.
Component Requirements (IEC 62443-4-2)
Technical requirements for embedded, host, network, and application components—mapped via FR 1–7.
Policies & Enforcement
Threats, Events & Response
Events & Incident Response
Correlate identity + device + network signals, quarantine compromised assets, and capture evidence.
Integrations, Compliance & API
Integrations (SIEM/SOAR, IAM, EDR, MDM, CMDB)
Connect QuantLayer signals and actions to your security stack and workflows.
Compliance & Reports
Generate audit-ready evidence packs with immutable logs, posture history, and enforcement traceability.
API Overview
Authentication, event queries, policy automation, and evidence export patterns.
Troubleshooting & FAQ
Common setup issues, policy rollout safety tips, and OT-friendly guidance.
Core Concepts
Identity, trust posture, signals, enforcement, segmentation, and evidence—your foundation for Zero Trust.
First 30 Minutes: From Enrollment to Enforcement
Enroll → verify trust → generate policy → simulate → enforce → review evidence.
CISO Dashboard — Documentation Pages
Need Implementation Help?
Our security architects can help you design and deploy Zero Trust across your environment.
Talk to an Expert