Skip to content

Governance

Provisionr’s governance is tenant-first — every decision starts with “which tenant does this belong to?” and flows from there. Each tenant has its own identity boundary, and cross-tenant access is explicitly brokered.

The first octet of every identifier declares the tenant:

prv-... → Provisionr (primary)
ocs-... → Our Collaborative Space
pqx-... → Piqued X
pai-... → Piqued AI
psl-... → Piqued Solutions
pst-... → Piqued Studios

Cross-tenant access is never implicit. It requires:

  1. An explicit bridge (Infra router) or shared role group.
  2. Documentation of the business justification.
  3. Approval from both tenant owners.
  4. Quarterly review of the cross-tenant grant.

These rules are never waived:

  1. OUs never grant access. OUs are policy buckets. Access flows only through Role groups.
  2. Minimum two owners on every group.
  3. Security label is irreversible. If you need to change it, recreate the group.
  4. No individuals on drive ACLs (except M365 ROSTER mode).
  5. Admin roles are time-boxed. No permanent elevated access without quarterly attestation.
  6. Breakglass requires two-person rule and evidence.
  7. Mail pipe groups never appear on ACLs.
  8. People/Identity rosters never grant access.
  9. Automation accounts never own content.
  10. STRICT drives: no externals, ever.

The nomenclature system supports evidence generation for common compliance frameworks:

FrameworkRelevant ControlsEvidence Source
SOC 2Access control, change managementRole attestations, JML logs, quarterly reviews
ISO 27001A.9 (Access), A.12 (Operations)Group audits, OU policy drift, breakglass tests
CMMCAC (Access Control), IA (Identification)Role membership exports, MFA enforcement, DLP
FunctionAccountableResponsibleConsultedInformed
OU PolicyPLTPLT-WSSECAll
Group CreationGroup ownerPLTSECAffected teams
Role GrantsRole ownerPLTSECGrantee
Mail Pipe ConfigPLTPLT-WSSEC, FunctionUsers
Customer EngagementOpsOps + EngPLT, SECSales
Tenant GovernanceExecPLT + SECLegal, FinAll
LevelLabelWho Can AccessExamples
PublicPublicAnyoneMarketing assets, OSS
PrivatePrivateInternal (all active)Internal docs, TEAM drives
ConfidentialConfidentialNeed-to-knowFinance, HR, client TEAM
RestrictedRestrictedNamed individuals onlySTRICT drives, legal holds
  • Default: 3-7 years depending on content type.
  • Legal holds override retention schedules.
  • STRICT content: retain per engagement contract + legal requirements.
  • Offboarded accounts: retain Vault holds as required.
CadenceWhatWho
MonthlyAdmin role attestation, probation promotionsPLT, Role owners
QuarterlyFull controls review (see Lifecycle page)PLT + SEC
AnnuallyTenant governance review, compliance audit prepExec + PLT + SEC + Legal

This nomenclature system itself is versioned and governed:

  • Versioning: Semantic versioning (e.g., v001, v002).
  • Changes: Proposed via PR. Reviewed by PLT + SEC.
  • Deprecation: Old patterns get a 90-day sunset with migration guide.
  • Breaking changes: Require Exec + PLT + SEC approval.