Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
Control Module

FV-Lock: Identity-Bound Access Control

Critical infrastructure access should never depend on a single credential, a single approval, or a single person. Lock requires multiple authorised parties to approve access before any physical path is activated, ensuring oversight at every step.

Back to Control
Control

Control Module

If a single credential can open the door, a single compromise opens the door. Multi-party authorisation ensures that no individual, whether legitimate or malicious, can access critical systems alone.

Multi-party

Every access requires approval from multiple authorised individuals

Zero

Single-credential access to critical systems

Identity-bound

Authorisation tied to verified identity, not just credentials

100%

Authorisation events logged on tamper-proof storage

The Problem

Single-factor authorisation is a single point of failure.

Single Credential Access

A single compromised password, token, or certificate grants full access to critical systems. No amount of password complexity eliminates the risk of credential theft through phishing or social engineering.

Approval Without Oversight

Traditional access management allows a single administrator to approve their own access to the most critical systems. There is no check on whether that access is appropriate or authorised.

Identity Spoofing

Attackers impersonate legitimate users through credential theft, session hijacking, and MFA bypass techniques. Without multi-party verification, spoofed identity grants full access.

The Scenario

Scenario: Preventing Unauthorised Access Through Multi-Party Control

An attacker compromises a senior network engineer's credentials through a targeted phishing campaign. They attempt to access the management interfaces for core firewalls and switches. Despite having valid, highly privileged credentials, the access request triggers a Lock authorisation workflow. A second authorised party — the security operations manager — must approve the session before the physical path to the management network is activated. The security operations manager, unaware of any scheduled maintenance, denies the request and triggers an investigation. The attacker is contained before reaching any management interface.

"The credentials they stole would have given them access to everything. But the Lock module required a second authorisation from someone else on our team. That second check stopped the attack cold."

Module Overview

Access that requires human oversight, every time.

FV-Lock ensures that critical infrastructure access always requires multiple verified individuals to approve. Combined with identity verification, time-bound sessions, and tamper-proof logging, Lock eliminates the risk of single-credential compromise leading to infrastructure access.

  • Multi-party authorisation for all critical system access
  • Identity verification beyond credentials alone
  • Configurable approval requirements by system criticality
  • Automatic session termination after approved duration
  • Emergency override with enhanced logging
  • Tamper-proof audit trail of all authorisation events
Lock

Lock — How It Works

Module 1 of 4

Lock gates physical path activation behind multi-party authorisation. Before any connection to critical infrastructure is established, the configured number of authorised parties must approve the request through verified identity. The physical path is activated only after all required approvals are received.

Featured In

TechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in EssexTechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in Essex

Key Capabilities

Multi-Party Authorisation

Access requires approval from a configurable number of authorised parties. No single individual can activate a path to critical infrastructure alone.

Identity Verification

Each authorising party is verified through strong identity mechanisms, not just credentials. Biometric, hardware token, and location verification are supported.

Role-Based Policies

Authorisation requirements vary by system criticality. Core infrastructure may require three-party approval while standard systems require two.

Time-Bound Sessions

Authorised sessions are automatically terminated after the approved duration. Extensions require fresh multi-party approval.

Emergency Override

Emergency access procedures provide accelerated authorisation with enhanced logging and mandatory post-access review.

Complete Audit Trail

Every request, approval, denial, and session is recorded on tamper-proof, physically disconnected storage.

Demo to Live

Adoption Guide

Step 1

Access Governance Audit

Identify all critical systems where single-credential access currently exists and map the authorisation requirements for each.

Step 2

Authorisation Policy Design

Define multi-party requirements, identity verification methods, backup authoriser chains, and emergency override procedures for each system tier.

Step 3

Core Infrastructure Pilot

Deploy Lock on the most critical management interfaces, testing approval workflows, emergency procedures, and session time limits.

Step 4

Full Governance Deployment

Extend to all governed systems with automated policy enforcement, mobile approval notifications, and continuous compliance evidence.

Step 1

Access Governance Audit

Identify all critical systems where single-credential access currently exists and map the authorisation requirements for each.

Step 2

Authorisation Policy Design

Define multi-party requirements, identity verification methods, backup authoriser chains, and emergency override procedures for each system tier.

Step 3

Core Infrastructure Pilot

Deploy Lock on the most critical management interfaces, testing approval workflows, emergency procedures, and session time limits.

Step 4

Full Governance Deployment

Extend to all governed systems with automated policy enforcement, mobile approval notifications, and continuous compliance evidence.

Questions

Frequently Asked

Ready to take the next step?

See how Control can govern your data paths with physical enforcement no software exploit can bypass.

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy