An enterprise governance platform providing centralised access control, policy management, and compliance visibility across multi-tenant organisational structures — layered above your existing infrastructure.
Control Plane sits above your existing infrastructure, imposing governance without requiring migration. Define policies once, enforce them everywhere.
Define granular access and resource policies in a single place. Apply them across every tenant, application, and user role without touching individual systems. Policy changes propagate instantly across the entire governance hierarchy.
Every access event, policy evaluation, and resource action is captured and queryable in real time. Compliance dashboards surface violations, anomalies, and approval workflows without manual log trawling.
Designed to layer above AWS, Azure, GCP, on-premise systems, and SaaS applications alike. No vendor lock-in at the governance layer — integrate once, govern everything.
Strict organisational isolation with cross-tenant visibility for platform administrators. Each tenant maintains full data separation while the platform owner retains governance oversight across all tenants simultaneously.
Five distinct layers, each with clear responsibilities. The platform is designed for horizontal scalability and provider-agnostic deployment.
Four primary subsystems, each independently maintainable and extensible. Every component exposes a public API for integration.
The central policy evaluation and enforcement layer. Evaluates access decisions in real time using a declarative rule system. Supports hierarchical policy inheritance across org, tenant, team, and user levels.
Role-based and attribute-based access control across all platform resources. Supports fine-grained permission sets, temporary escalations, and delegated access workflows.
Immutable audit log capturing every access event, policy evaluation, and administrative action. Structured for SOC2, ISO 27001, and POPIA compliance reporting with automated evidence generation.
Track, categorise, and enforce policies on all governed resources. Supports tagging, quota management, cost attribution, and resource lifecycle controls.
Three configurable security tiers aligned to organisational risk profiles. Government tier meets SABS, POPIA, and ISO 27001 requirements.
| Control | Standard | Enhanced | Government |
|---|---|---|---|
| Password Policy | 8 char, complexity | 12 char, complexity + history | 16 char, full complexity, 90-day rotation |
| MFA | Optional | Required for admin roles | Required for all users |
| Session Timeout | 8 hours | 4 hours | 1 hour (idle) / 8 hours (absolute) |
| Device Trust | Not required | Registered devices preferred | Managed devices required |
| Audit Retention | 90 days | 1 year | 7 years (immutable) |
| Encryption | TLS 1.2+, AES-256 at rest | TLS 1.3, AES-256, key rotation | TLS 1.3, HSM-backed keys, FIPS 140-2 |
Pre-built connectors for the most common identity and storage providers. Custom connectors available via the Adapter SDK.
Three deployment options to match your infrastructure posture and regulatory requirements.
Fully managed. We handle infrastructure, updates, backups, and scaling. Fastest path to production — live in hours.
Deployed into your AWS, Azure, or GCP account. You own the data plane. We manage the control plane updates via automated pipeline.
Air-gapped deployment on your own hardware. No external network calls. Manual update process with cryptographic release verification.
Six primary views, each purpose-built for a governance workflow. No generic dashboards — every interface surfaces exactly the data operators need.
Real-time overview of policy health, access events, active sessions, and compliance posture across all tenants. Surfaced as operator-grade data, not marketing charts.
Create, version, and deploy access policies. Visual conflict resolver highlights overlapping rules before deployment. Full history and rollback support.
Graph-based visualisation of the full permission hierarchy. Click any user, role, or resource to inspect its access path and trace exactly how a permission was granted.
Framework-mapped compliance posture for SOC2, ISO 27001, and POPIA. Automated evidence collection with export-ready audit packages for assessors.
Bulk user provisioning, role assignment, and access review workflows. Integrates with upstream identity providers — users are sourced from your directory, governed here.
Structured, filterable, tamper-evident audit trail. Full-text search across all event fields. Exportable to SIEM, CSV, and compliance tooling.
Control Plane is a governance layer, not a replacement for your existing infrastructure. Understanding the boundary matters.
You operate complex, multi-tenant infrastructure and need a consistent governance layer above it.
Control Plane does not replace your identity provider, cloud infrastructure, or existing security tools.
Click through the live demo — switch roles, trigger access controls, and explore the full governance hierarchy. No login required.
Try Live Demo →