Risk Scoring Model
Deterministic Pre-Execution Risk
Risk scoring exists to make governance proportional and enforceable. The model is designed to be deterministic (same inputs → same score) so audits, incident reconstruction, and compliance reviews remain coherent.
Why Risk Scoring Exists
Without risk scoring, every action must be treated as equally dangerous or equally safe—both are wrong. Layer-7 uses risk scoring to route authority requirements and enforce gates proportionally.
Governance proportionality
Low-risk actions can be allowed automatically; high-risk actions require approvals and stronger logging guarantees.
Consistency at scale
Multiple teams and vendors can run the same model and produce consistent outcomes across environments.
Audit reconstruction
Risk reasons explain “why” a decision was escalated, denied, or forced through multi-sig.
Risk Bands
The risk model outputs a normalized score in [0.00 – 1.00] and assigns a band. Bands map directly into authority + enforcement behavior.
| Band | Score range | Typical behavior |
|---|---|---|
| Low | 0.00 – 0.24 | Auto-allow if policy passes + ledger confirmed (or ledger async for non-sensitive reads) |
| Medium | 0.25 – 0.54 | Allow with stricter policy gates; optional single-signature depending on action class |
| High | 0.55 – 0.84 | Requires authority approval (role-based); ledger must confirm before execution |
| Critical | 0.85 – 1.00 | Multi-sig + explicit exception path; may require executive panel review; default deny until satisfied |
Scoring Inputs
Risk scoring uses structured signals from the decision object. All inputs must be stable and auditable. If an input is missing, the model must fail safe.
Primary inputs
- Action class (read/write/deploy/transfer/notify/etc.)
- Environment (dev/staging/production)
- Target sensitivity (PII, credentials, funds, infrastructure)
- Blast radius (single object vs multi-system / bulk)
- Irreversibility (can rollback or not)
Secondary modifiers
- Actor role (privileged vs unprivileged)
- Time pressure (emergency flag triggers stricter logging)
- Novelty (first-time action/target → higher scrutiny)
- Policy exceptions (requires_exception increases risk)
- Dependency health (ledger degraded → deny/queue)
Deterministic Scoring (Reference Model)
This is a reference scoring pattern that stays deterministic and easy to audit. Implementations can extend weights, but must keep “reasons” and fail-safe handling.
Risk → Authority → Enforcement Mapping
Risk bands drive required approvals and the enforcement outcome emitted to the gateway. Authority routing is explained in the authority model; this page defines the mapping contract.
Authority routing contract
- Low: no approvals required (unless policy forces approval)
- Medium: optional single-approval for write actions
- High: required role approval(s) by action class
- Critical: multi-sig + exception path; may require executive review
Enforcement contract
- Allow only when policy passes + authority satisfied + ledger confirmed
- Deny when policy fails, risk unknown, or dependencies degraded
- Queue while awaiting approvals or ledger recovery
- Escalate when exception required or critical risk detected
Examples
Example A — Read a public doc
- Class: read_public
- Env: production
- Sensitivity: none
- Outcome: score ~0.25 → Medium
Example B — Deploy code to production
- Class: deploy_code
- Env: production
- Blast radius: bulk
- Outcome: score ~0.95 → Critical
Example C — Transfer funds
- Class: transfer_funds
- Env: production
- Irreversible: true
- Outcome: score ~1.00 → Critical
Example D — Write to a customer record (PII)
- Class: write_data
- Target: PII
- Env: production
- Outcome: score ~0.85 → Critical