1b. Architecture Map: Policy

Trucast Governance Architecture


Figure 1b:

Trucast Array-Based Governance Logic

This diagram illustrates the comprehensive governance architecture of the Trucast system, showcasing the interplay between context-aware access, logical schema management, and policy enforcement.


Exhibit Summary: Trucast Governance Architecture

The Trucast Governance Architecture diagram outlines a sophisticated, multi-layered approach to data governance and access control. This architecture is designed to ensure robust security, compliance, and contextual access management across the Trucast ecosystem. The diagram is divided into four main layers:

Context-Aware Access Layer: This layer, highlighted in light blue, forms the foundation of the governance architecture. It includes:

  • Actor-Action Context: Defines access based on specific user actions and roles.

  • Access Level Definitions: Establishes hierarchical access permissions.

  • Service Perimeters: Sets boundaries for service accessibility.

Logical Schema Layer: This layer bridges business context with data structures, comprising:

  • Real-World Model Logic: Represents real-world entities and relationships.

  • Business Context Engine: Integrates business rules and context into access decisions.

  • Semantic Relationships: Maps connections between different data elements and concepts.

Governance & Policy Layer: The core of the governance structure, including:

  • XACML Policy Engine: Enforces standardized access control policies.

  • Dublin Core Metadata and OMG Exchange Framework: Facilitate metadata management and exchange.

  • Policy Templates: Pre-configured policies for IP Protection and PII Compliance.

  • Array-Based Access Control (ABAC): Implements granular, context-driven access control.

Systems of Record: Represents the data storage and integration points:

  • Primary SOR: The main data repository.

  • Client SOR Connector: Enables integration with client-specific data sources.


Key features of this architecture include:

  • Contextual access control based on actor-action workflows and business requirements.

  • Real-time integration of business context with access decisions.

  • Field-level, array-based control driven by actor-action context and business logic.

  • Extensible policy framework supporting various compliance and protection needs.

Last updated

Was this helpful?