When people hear “provisioning by policy,” it can sound abstract. But the problem it’s solving is very real, and most organizations are living it right now.
Data access has become one of the biggest bottlenecks in the enterprise. Governance teams are drowning in requests they can’t keep up with. Users wait days, sometimes weeks, before getting access to critical data they need just to do their jobs. And implementing a robust system to fix that has been a long time coming.
Here’s what it actually looks like when organizations get it right.
The core idea
Provisioning data by policy allows users to gain access to data securely and at scale. Instead of needing to approve the same access requests over and over, admins can create a policy that states, plainly, what types of users can access what types of data. Once that policy is in place, the appropriate users get access to the appropriate data – no access request necessary.
What birthright access means in practice
Birthright access means having an overarching set of rules or policies in place that give users access to data automatically. If all analysts should be able to access tables tagged “data analytics,” you create a policy that states that rule, and those users are given access from day one.
Once birthright access is in place, you cut down on data access requests significantly right off the bat. That frees up governance teams to focus on things like managing exceptions, building out more granular policies, and implementing guardrails, instead of just processing the queue.
What attributes actually drive these policies
In terms of attributes, we see a mix of everything, but the most common are around roles, departments, credentials, and location.
A very common example: users in a certain department, say, fraud detection or claims processing, who have completed the latest security training can get access to data if their country location matches the country that the table is tagged with. That single policy combines user metadata and data metadata. It ensures that only the qualified people are accessing data, and that data from clients in one location doesn’t get incorrectly viewed by someone in another.
What actually changes when organizations move to policies
Managing access manually simply doesn’t scale, especially in a world of agents. Even before the rise of agents, governance teams were struggling to keep up with data access requests. It was a huge bottleneck. Users would wait days, sometimes weeks, before getting access to critical data they needed just to do their jobs.
When organizations rely on policies that provision birthright access, they significantly cut down on the number of requests they need to manage. Users get access faster, and the business can accelerate without data access being the limiting factor.
Where policies fall short
I want to challenge the expectation that policies can cover everything, in case anyone was ever expecting them to. Broadly speaking, there are exceptions to every rule. Policies can cover a lot, but there will always be one-off use cases that aren’t covered, or cases where a rule simply needs to be broken.
That’s where having a system to provision data by request, instead of relying fully on policies, becomes essential. It’s the fastest way to get people access safely and efficiently when a policy doesn’t apply.
What good request-based provisioning looks like
Good request-based provisioning has context. There should never be a case where a human approver gets an access request, knows nothing about the identity requesting access, and has to make a blind decision on whether it’s safe to grant it. That’s a process set up to fail.
At minimum, an access request needs to have context: who the user is, why they need access, and what use case it’s for, so you can determine how long access should actually last.
What makes it even more effective is having a system with records of previous access requests so admins have something to guide their decisions. If I’m an admin and I see there have already been ten-plus approved requests for similar data to similar users, that makes my decision a lot easier. It all comes down to having the right information to empower reviewers, instead of forcing them to go through the process blindly.
Why policy plus request changes everything
If an organization doesn’t have a policy-based model, or some sort of process to automate access decisions, then even before the rise of agents, they were already behind. Every organization we’ve talked to that doesn’t have something like this in place has told us the same thing: they’re bogged down with request after request, and their teams can’t keep up.
With the rise of agents, that problem only gets worse, multiple times over.
A policy-plus-request model allows organizations to accelerate much more quickly. Data access has been a bottleneck for so long, relying on manual processes. Implementing a robust system – provisioning data by policy and by request — lets businesses move faster, gets people quicker access to data, and lets data teams focus on areas outside of just managing approvals. That makes the whole organization safer.
Frequently Asked Questions
What is the difference between provisioning by policy and role-based access control (RBAC)?
RBAC assigns access based on predefined roles, but roles are static and tend to multiply over time as organizations try to cover more edge cases. Policy-based provisioning uses dynamic attributes to evaluate access in real time, resulting in more precise access with less administrative overhead and role sprawl.
Can policy-based provisioning work across multiple data platforms?
Yes, and that’s one of the key reasons it matters. Policies authored once can be enforced natively across data warehouses, lakes, and other platforms without rewriting controls for each environment. That “write once, enforce everywhere” model is what makes governance scalable as ecosystems grow.
How do you prevent policies from becoming outdated as organizations change?
Policies tied to user attributes update users’ automatically as those attributes change. If someone moves departments, changes roles, or lets a certification lapse, their access adjusts accordingly. Recertification workflows can also be layered on top to catch anything that drifts over time.
Does this model work for non-human identities like service accounts or AI agents?
The same policy framework that governs human access can extend to non-human identities. For AI agents specifically, the approach shifts toward temporary, task-scoped access, provisioned dynamically when needed and revoked when the task is complete, rather than standing permissions that persist beyond their purpose.
What’s the risk of over-relying on policies and under-investing in request workflows? Gaps are inevitable. Organizations that don’t build a functioning request process alongside their policies end up with users going around the system sharing credentials, using workarounds, or simply not getting the data they need. The request layer is what makes the overall model resilient.
The access model your data teams actually need.
Policy-driven provisioning for automatic access. Governed request workflows for everything else.