§ 09 · Governance — controlling access
Powered by SailPoint v2025 data models

Not just checking access — controlling it.

Zero Trust governs how access is granted, reviewed, and removed.

Every action permanently audit-logged.

Capability · 01

Entitlement provisioning

Formal process for granting access, with full audit trail.

SailPoint
Capability · 02

Certification campaigns

Periodic reviews where managers confirm each team member's access is still appropriate.

SailPoint
Capability · 03

Access requests

Employees request new access with business justification; managers approve or deny.

SailPoint
Capability · 04

Segregation of duties (SOD)

Prevents dangerous combinations — no one can both trade and approve trades.

SailPoint
Capability · 05

Audit logging

Every governance action permanently recorded — immutable evidence trail.

SailPoint
Capability · 06

Governance algorithms

BeforeProvisioningRule pre-checks SoD before any grant. Certification scope: all / high-risk / node / department. Access requests follow a formal state machine: Pending → Approved / Denied.

SailPoint

SailPoint data models in production use

Every employee is represented as a real SailPoint SDK object — the same objects that drive IdentityNow and IdentityIQ in production.

Identity

The person and their attributes — name, role, department, clearance, hire date.

Account

Link between identity and downstream system — connects the person to their applications.

Entitlement

Permission with risk level and requestability flag — the atom of access control.

Role

Bundle of entitlements with assignment rules — groups related permissions for easier management.

SOD Policy

Conflict-detection rule — prevents dangerous combinations of permissions across roles.

Four governance workflows

WorkflowImplementation
Provision entitlementBeforeProvisioningRule checks SoD conflicts first
Run certification campaignScope by all / high-risk / node / department, reviewed by manager
Submit access requestPending → Approved / Denied state transitions
Revoke entitlementFull audit event logged — grant and revocation both permanent
Previous08 · Identity analytics