Rule

Access Policy

A permission configuration — roles, resources, conditions, and enforcement that controls access.

Last updated: February 2026Data current as of: February 2026

Why This Object Matters for AI

AI access analysis and least-privilege enforcement require policy data; compliance depends on policy management.

Security & Compliance Capacity Profile

Typical CMC levels for security & compliance in SaaS/Technology organizations.

Formality
L3
Capture
L3
Structure
L3
Accessibility
L3
Maintenance
L3
Integration
L3

CMC Dimension Scenarios

What each CMC level looks like specifically for Access Policy. Baseline level is highlighted.

L0

Access policy configuration is entirely informal — developers add IAM roles and resource permissions ad-hoc, and there's no documented standard for how access policies should be structured, reviewed, or enforced across SaaS services.

None — AI has no access policy definitions or standards to evaluate or enforce.

Document basic access policy standards defining role naming conventions, resource permission templates, and required conditions (MFA, IP restrictions) for sensitive operations.

L1

A general access policy document states principles like 'least privilege' and 'no wildcard permissions,' but specific rules for which roles get which SaaS resource permissions are not defined — enforcement depends on which engineer writes the policy JSON.

Can reference the policy standards document but cannot operationalize it because rules are stated as principles rather than specific role-to-permission mappings.

Define specific role-to-permission mappings for each SaaS service specifying allowed actions, resource scopes, and required conditions per role tier.

L2

Role-to-permission mappings define allowed actions and resource scopes per SaaS service, but conditional access requirements (time-based restrictions, device posture checks), periodic review schedules, and automatic revocation triggers are not formalized.

Can validate access policy changes against role mappings but cannot enforce conditional access requirements or detect when policy reviews are overdue.

Formalize conditional access requirements (device posture, network location, time windows), mandatory review schedules per permission tier, and automatic revocation triggers for offboarding and role changes.

L3Current Baseline

Access policy rules define role-based permission templates, conditional access requirements (device posture, geolocation, time windows), periodic review schedules per sensitivity tier, and automatic revocation triggers for offboarding and lateral transfers.

Can enforce access policies end-to-end — validating permission requests, evaluating conditions, scheduling reviews, and triggering revocation based on HR events and compliance signals.

Encode access policy rules in machine-readable policy-as-code (OPA/Cedar) with automated enforcement, condition evaluation, and exception handling workflows.

L4

Machine-readable policy-as-code (OPA/Cedar) enforces access policy rules automatically — role validation, condition evaluation, separation-of-duties checks, and exception routing execute programmatically with full audit trails and drift detection.

Can autonomously enforce access policies across all SaaS services — automated permission validation, condition evaluation, violation remediation, and compliance evidence generation.

Deploy adaptive access policy logic that adjusts permission conditions based on behavioral risk scoring, usage pattern analysis, and organizational restructuring signals in real time.

L5

Adaptive access policy logic adjusts in real time — permission conditions tighten for anomalous behavior patterns, new roles auto-generate policy templates from peer permission analysis, and unused permissions auto-recommend for revocation.

Can autonomously manage the full access policy lifecycle — creation, enforcement, adaptation, and decommission — based on real-time behavioral and organizational signals.

Ceiling of the CMC framework for this dimension.

Capabilities That Depend on Access Policy

Other Objects in Security & Compliance

Related business objects in the same function area.

What Can Your Organization Deploy?

Enter your context profile or request an assessment to see which capabilities your infrastructure supports.