Banking · SoD & Fraud Prevention

Catch the toxic
combination.
Before the wire.

Segregation of duties enforced at request time. Not at audit time.

In banking, the SoD violation that matters is the one that lets the same person initiate a transaction, approve it, and modify the audit log. Most IGA platforms catch it on a quarterly certification — three months after the fraud already happened. STRATUS catches it the moment the access request is submitted, with an immutable evidence chain you can hand directly to your regulator.

Plan a 30-Day Proof of Revoke See SoD examples
The Fraud Window

How long between
conflict and detection?

The shorter the window between an SoD-violating access grant and the moment the conflict is detected, the smaller the fraud blast radius. Most platforms run that detection on a quarter. STRATUS runs it on a request.

90 days
Standard IGA quarterly cert window
< 2s
STRATUS conflict detection at request time
4h 17m
Avg termination-to-revocation gap
Toxic Combination Examples

What the rule library
actually blocks.

Concrete examples from the pre-built SoD rule library shipped with STRATUS AccessGov. These are real conflicts STRATUS catches at request time — before the access is granted, not after the wire was sent.

⚠ Toxic · Wire Initiator + Approver

Same person can initiate and approve a wire transfer.

sap.role: WIRE_INITIATE
sap.role: WIRE_APPROVE
sap.role: GL_POSTING
STATUS: SoD_VIOLATION_BLOCKED

Detected at the request layer. Request denied automatically. Compliance reviewer notified. Evidence pack captured even though the grant never happened — proving to the auditor that the control fired.

✓ Approved · With Mitigating Control

Same person can read both, but write only one.

sap.role: WIRE_INITIATE
sap.role: GL_READ_ONLY
MITIGATION: read-only second role
STATUS: APPROVED · LOGGED

Request fits the rule library's accepted pattern. Approved with full audit trail. The mitigating control (read-only second role) is captured in the evidence pack for the next external audit.

⚠ Toxic · Loan Officer + Underwriter

Same person can originate and underwrite a loan.

loan.role: ORIGINATOR
loan.role: UNDERWRITER
loan.role: APPROVE_OVER_500K
STATUS: SoD_VIOLATION_BLOCKED

Origination/underwriting separation is a regulatory requirement (FFIEC, OCC). STRATUS blocks at request time with the mapped policy rationale and regulatory reference in the denial reason. Specific regulatory mappings are validated case-by-case with your compliance counsel.

⚠ Toxic · Cash Custody + Reconciliation

Same person can move cash and reconcile the position.

treasury.role: CASH_MOVE
treasury.role: GL_RECONCILE
treasury.role: SUSPENSE_CLEAR
STATUS: SoD_VIOLATION_BLOCKED

The classic embezzlement vector — moves money, then makes the books match. STRATUS blocks the combination before the second role is even granted.

For Banking Buyers Specifically

The four pieces that
your auditor cares about.

02 · Detection Timing

At request, not at certification.

Conflicts caught when the access is requested — before the grant. Quarterly certifications still happen (they have to for SOX §404) but they validate the system, not catch the fraud.

03 · Evidence

Auditor-grade. Non-repudiable.

Every blocked SoD attempt becomes an Evidence Pack. Every approved grant with a mitigating control becomes an Evidence Pack. Hand it to the auditor; they verify with math, not with our word.

04 · Closed Loop

Terminations close the access. In seconds.

The classic banking fraud vector — terminated employee retains access for hours, walks customer data out, makes a final wire. STRATUS closes the loop in 8 seconds end-to-end (measured: HR event in to evidence pack sealed across AD, Okta, and AWS in a lab environment; customer production timing varies by connector maturity, approval policy, and target-system API behavior), with proof. All over outbound-only mTLS — zero inbound firewall ports.

Want the SoD rule
library preview?

The complete pre-built SoD rule library — with regulatory citations and configurable mitigating-control templates — is available as part of a 30-Day Proof of Revoke.

Request SoD Rule Library Preview Plan a 30-Day Proof of Revoke Check Connector Fit