Overview
Each SoI defines who can do what, from where, and with which data. Controls are enforced continuously and adapt to risk signals in real time.
For confidential work—source code, strategic docs, customer PII. Strict verification, least-privilege access, and strong data loss prevention.
For collaboration—partners, contractors, and cross-org work. Flexible access with scoped data sharing and watermarking.
For public interactions—marketing sites, communities, docs. Open by default with abuse prevention and privacy-respecting analytics.
Protocol
Default deny. Verify explicitly. Limit blast radius. Protect sensitive data by design.
Scope
Trust assumptions
Identity
Device posture
Context & risk
Access controls
Telemetry & monitoring
Data handling
Automation & response
Protocol
Open by default, safe by design. Protect against abuse while respecting privacy.
Scope
Trust assumptions
Identity
Device posture
Context & risk
Access controls
Telemetry & monitoring
Data handling
Automation & response
Reference
A quick reference for teams to select the right SoI for a given workload.
Control | Private | Social | Public |
---|---|---|---|
Identity | Passkeys + step-up; re-proofing | Federated SSO; time-boxed | Anonymous or optional social login |
Device | Managed & healthy required | Browser isolation / light attestation | Unknown; treat as untrusted |
Network | mTLS, private egress, CASB | Segmentation per tenant | CDN + WAF + DDoS |
Data | Field-level encryption, strict DLP | Mask on share; watermark | Minimize collection; consent |
Monitoring | Full audit, SIEM, UEBA | Tenant logs, session replay | Edge telemetry & abuse heuristics |
FAQ
Quick answers for security, IT, and product teams rolling out SoI.
Deploy guardrails that follow your users and data across Private, Social, and Public spheres. Start with a threat-informed baseline and tailor policy per SoI.
Protocol
Social SoI — Zero Trust Protocol
Trusted collaboration with clear boundaries. Verify participants, isolate sessions, and scope data sharing.
Scope
Trust assumptions
Identity
Device posture
Context & risk
Access controls
Telemetry & monitoring
Data handling
Automation & response
Session isolation
Scoped collaboration
Watermark & label