Policy-based access control for AI
Express the rule your auditor reads — "deny if requester is contractor AND resource is confidential AND time is outside business hours" — and let it run on every AI request. Subject, resource, action, AI-client, environment, context.
Three pillars of enterprise AI governance
Six attribute categories
Subject (role, team, clearance, employment status, manager, IdP groups). Resource (label, owner, project, retention, confidentiality). Action (read, write, delete, share_external, send_on_behalf). AI-client (vendor, model, region, MCP server identity). Environment (time, geolocation, network, device posture, request rate). Context (approval state, break-glass tokens, parent request).
Runtime context, beyond RBAC
RBAC binds permissions to roles ("eng-cursor can read Drive"). PBAC adds runtime context: time-of-day, source IP, recent behavior, sensitivity classification, device posture. The same user gets a different decision at 3am on an unmanaged device than at noon on a managed laptop.
Auditor-grade expressions
WHEN subject AND resource AND action AND environment THEN allow / deny / require approval. Policies are versioned, diffable, and testable against historical request traces before rollout. Every evaluation produces a per-request audit record naming the policy version that decided it.
How PBAC helps you satisfy the controls your auditors read
| Requirement | What PortEden does | Evidence |
|---|---|---|
| NIST 800-53 AC-3(4) — Attribute-based access control (ABAC) | PBAC engine evaluates subject, resource, action, and environment attributes per request. Decisions are recorded with the policy version, attribute snapshot, and outcome. | Per-request attribute trace · policy-version-stamped decisions |
| NIST 800-53 AC-16 — Security and privacy attributes | Attributes (clearance, classification, purpose, sensitivity) propagate from IdP and resource metadata into the policy evaluator at request time. | IdP + resource attribute propagation · per-request snapshot |
| SOC 2 CC6.1 / CC6.3 — Logical access & user access management | Per-request access decisions with full attribute trace. Continuous evidence collection via SIEM stream supports CC6.1 and CC6.3 populations. | Tamper-evident SIEM stream · per-request decision evidence |
| HIPAA §164.312(a)(1) — Access control (technical safeguard) | Minimum-necessary access enforced via patient-panel and clinician-id attributes. PHI never reaches an AI client outside the authorized scope. | Per-request decision log · default-deny on missing scope |
| GDPR Art. 25 — Data protection by design and by default | Privacy attributes (purpose, lawful basis, data subject category) are required policy inputs. Defaults deny processing without an explicit purpose attribute. | DPA · default-deny on missing purpose attribute |
| ISO 27001 A.5.15 / A.5.34 — Access control & privacy | Documented attribute model. Per-request audit supports access reviews and DPIA evidence. | Documented attribute model · per-request audit exportable |
Built for procurement
Talk to our enterprise team
30-minute discovery call. Bring your security questionnaire.
Frequently Asked Questions
What is PBAC and how does it differ from RBAC?
Do you support ABAC (attribute-based access control)?
Can policies require human approval before allowing access?
How are conflicting policies resolved?
Can I test policies before rolling them out?
How are policy changes audited?
Ready to govern AI across your organization?
Book a discovery call. Bring your security questionnaire — DPA, subprocessor list, and pen-test summary available on request.