Zero Trust Policies
Create least-privilege access and segmentation policies using identity, posture, and context—then roll out safely with staged enforcement.
Policies
Enforcement
Least Privilege
OT/ICS
9 min
Last updated: 2026-01-22Overview
QuantLayer policies answer who can access what, from where, under which conditions—and what happens when trust changes.
Policy model
- Subject (identity) + Resource + Action + Context.
- Decision: allow, deny, step-up, isolate, quarantine.
- Evidence: decision trace and outcome verification.
Enforcement modes
Observe
Monitor matches without blocking to validate impact.
Stage
Pilot enforcement to a subset with approvals and rollback.
Enforce
Apply controls and capture immutable evidence.
Break-glass
Emergency access with time limits and strict logging.
OT-safe rollout
Recommended OT sequence
Observe → baseline → define zones/conduits → stage enforcement → enforce during maintenance windows.
Policy patterns
- Integrity-gated remote admin.
- Step-up verification for privileged actions.
- Zone isolation when anomalies appear.
- Time-windowed patch operations.