Policy Engine

Fine-grained access control β€” beyond role-based to adaptive, contextual, and risk-aware policies

6

Active Policies

18

Total Violations

2,831

Total Enforcements

11

Services Covered

Policy Type Coverage

AWS Access β€” Engineering Only

ACTIVE
Attribute-Based (ABAC)

Restricts all AWS console and API access to employees in the Engineering or Platform Engineering departments. Enforced at provisioning and during quarterly access reviews.

89

Enforced

3

Violations

1

Services

#cloud#rbac
Modified Sep 15, 2024 by James Okafor

Privileged Access β€” Hardware MFA Required

ACTIVE
Context-Aware

Any access to critical systems (AWS Admin, Okta Super Admin, GitHub Admin, CrowdStrike Admin) requires hardware-backed MFA (FIDO2 / YubiKey). Enforced contextually on every session.

2,341

Enforced

12

Violations

4

Services

#security#mfa#privileged
Modified Nov 1, 2024 by Luca Bianchi

Finance Data β€” Separation of Duties

ACTIVE
Separation of Duties

Prevents any single employee from holding both Salesforce Admin and NetSuite Admin roles. Detects toxic combinations that could enable fraud.

4

Enforced

1

Violations

1

Services

#finance#sod#fraud-prevention
Modified Oct 1, 2024 by Luca Bianchi

Contractor Access β€” Time-Bound & Scoped

ACTIVE
Time-Based

Contractors automatically receive time-limited access aligned to their contract end date. Access expires automatically. No admin-level entitlements permitted.

156

Enforced

0

Violations

4

Services

#contractor#time-bound
Modified Jun 1, 2024 by System

Elevated Access β€” JIT Only for Production

ACTIVE
Just-in-Time

Direct production environment access is forbidden by default. Engineers must request Just-in-Time access, which expires in 4 hours and requires manager approval.

234

Enforced

0

Violations

2

Services

#jit#production#privileged
Modified Dec 1, 2024 by James Okafor

Risk-Based Access Throttling

ACTIVE
Risk-Based

Users with a risk score above 70 are automatically stepped down to read-only access pending security review. Above 90, access is suspended entirely.

7

Enforced

2

Violations

11

Services

#risk#adaptive#zero-trust
Modified Jan 15, 2025 by Luca Bianchi

Beyond Simple Access: Nexus Policy Hierarchy

LAYER 1

Who

RBAC + ABAC β€” identity, role, department, employment type

LAYER 2

What

Entitlement profiles β€” not just access, but exact configuration, features, and permissions

LAYER 3

When & Where

Time-based and context-aware β€” device compliance, location, session risk

LAYER 4

How much

JIT, SoD, and risk-based β€” least-privilege with automatic escalation and revocation