Skip to main content

Access Control Policies

Define and enforce access control policies to secure your CastellanAI environment.

Defense in Depth

Combine multiple access control policies to create layered security that protects against various attack vectors.


Overview

Control TypeDescription
IP-BasedRestrict by source IP address or network range
Time-BasedLimit to specific hours or days
GeographicAllow or block by country/region

Access Control Types

IP Allowlist & Blocklist

Control access based on source IP addresses, CIDR ranges, or network blocks.

Only allow access from approved IP addresses:

192.168.1.0/24    # Corporate office
10.0.0.0/8 # Internal network
203.0.113.42 # Specific trusted IP

IP Blocklist

Block specific malicious or suspicious IPs:

198.51.100.0/24   # Known malicious range
203.0.113.0/24 # Suspicious network
192.0.2.123 # Specific blocked IP
Precedence Rule

Allowlist takes precedence over blocklist. An IP in both lists will be allowed.


Configuring Access Control Policies

Step 1: Navigate to Access Control Settings

Access control policies are managed in Security settings.

Navigation Path: Settings → Security → Access Control

Administrator Only

Only users with Administrator role can modify access control policies.


Common Policy Examples

Corporate Network Only

Restrict access to corporate office networks with VPN for remote workers.

✓ Allowlist: 10.0.0.0/8 (Corporate LAN)
✓ Allowlist: 172.16.0.0/12 (VPN Range)
Applies to: All users except Administrator

Use Case: High-security environments requiring controlled network access.


Emergency Access & Bypass

Break-Glass Account

A special administrator account that bypasses all access control policies.

FeatureDescription
PurposeEmergency situations only
SetupDuring initial configuration
SecurityMFA with offline backup codes
MonitoringAll usage logged and alerted
Store Securely

Store break-glass credentials in a secure, offline location (e.g., safe, secure vault).


Best Practices

Access Control Do's

PracticeDescription
Use AllowlistMore secure than blocklist
Layer ControlsCombine IP, time, geo, and MFA
Document ExceptionsRecord why users are exempt
Test FirstAlways test with limited scope
Configure Break-GlassSet up before restrictive policies
Review QuarterlyUpdate as infrastructure changes
📝 Access Control Checklist
  • Configure break-glass account first
  • Document IP ranges to allow/block
  • Define business hours and time zones
  • Identify geographic restrictions needed
  • Test policies with non-admin account
  • Document all policy exceptions
  • Set up emergency bypass procedures
  • Schedule quarterly policy reviews
  • Train team on lockout recovery

What's Next?

GuideDescription
User Activity MonitoringMonitor access attempts
Multi-Factor AuthenticationAdd authentication layer
Roles & PermissionsRole-based access control