Classification-based Access Controls are not enabled by default on Foundry. Classification markings can differ between institutions and can therefore be configured differently between Palantir environments. Configuration of classification markings requires Palantir involvement.
Classification-based Access Controls (CBAC) are mandatory controls used to protect sensitive government information. CBAC markings, also known as classification markings, restrict access by requiring a user to have a particular classification marking in order to access information.
Access to classification markings may correlate with security clearance processes taking place outside the Palantir platform. As with mandatory controls generally, classification markings can be combined with other access requirements like discretionary roles and mandatory markings that may be applied to a resource.
There are three notable characteristics that are specific to classification markings:
country A
OR country B
can satisfy the disjunctive element in a classification marking (see below).Classification markings are configured in categories. For example, one category might define the type of data, and another category might describe how that data should be disseminated (i.e. shared).
A classification can have multiple classification markings. A classification can be made up of classification markings from different categories. Rules on what constitutes valid combinations of classification markings can be configured by Palantir and enforced in platform.
A defining feature of classification marking categories is that they can support disjunctive (OR
) behavior. When a category is conjunctive (AND
), a user must have access to all classification markings used from that category to access the classified data. When a category is disjunctive, a user can be authorized to access marked classified data by having any one marking of that category.
The components of an entire classification are combined conjunctively. This means that if a classification contains classification markings from multiple categories, a user must satisfy all components from each of the classification markings category to access the data.
Consider a simple configuration where there is a single category and two classification markings. The following simple configuration has two users: Martha Washington (mwashington
) and John Adams (jadams
).
The mwashington
user belongs to both the GBR
and CAN
classification marking groups. The user jadams
belongs to the GBR
group only. The RELEASE TO
category is disjunctive, meaning that users must have access at least one marking. In a disjunctive category, a user who has access to one marking from the classification marking can view data even if it is also labeled with other markings from the same category. This means that data classified with GBR
, CAN
can be viewed by either mwashington
or jadams
because both users have access to at least one of those markings.
The previous example is a single category in isolation. In practice, a classification marking can contain multiple categories of markings.
File classification is the classification marking that users must satisfy to discover the file, in addition to other requirements like project maximum classification and other mandatory markings.
Data classifications apply to certain types of files, such as datasets. Data classification refers to the classification that users must satisfy to view the data in the file. Users must satisfy the data classification in order to view the data within the file, but it does not affect their ability to discover the existence of the dataset and view its metadata (such as name, description and schema). The data classification cannot be edited directly; instead, the data classification is formed by combining:
This means the data classification is always at least as strict as the file classification and the data classifications of all of the upstream data dependencies.
File, data, and project classification are communicated in the Palantir platform alongside other applicable access requirements. Unlike data classification, which is automatically inherited, file classification can be edited in the resource sidebar as shown below.
A new non-derived dataset with no input upstream datasets requires the creating user to set a file classification.
Project classification can also be referred to as the Project’s maximum classification. All Projects in environments that use classification markings are required to have a Project classification set at time of creation.
Project classification governs two behaviors:
If a higher classification is added as a file classification on an upstream dataset in a different Project, and inherited as a data marking to a dataset within this Project, that data marking will violate the Project's maximum classification.
Project classification does not affect data classification of datasets in the Project. Project classification, therefore, does not get inherited along data dependencies. If there are derived downstream datasets in other Projects, only the data classification is inherited. This is different to the behavior of Project markings, which are inherited to downstream datasets.