Module access policy overview
-
- UpdatedJan 30, 2025
- 2 minutes to read
- Yokohama
- Now Platform Security
Module access policies (MAPs) are access controls that you apply to your cryptographic modules. Use these access policies to decide which users and scripts can access data encrypted by a cryptographic module.
Module access policies
Module access policies are introduced with the Key Management Framework (KMF) in the base system.
Module access policies expand on the role-based designations that were provided with the encryption modules. Module access policies can be based on the following:
- Basic (scope)
- Role
- System user
- Script
- Resource Exchange
Note: See Key Management Framework Resource Exchange for details.
In a cryptographic module, you must configure the correct module access policies to permit access to encrypted data. Without a module access policy associated with a cryptographic module, encrypted data isn’t visible to users and associated fields and columns in lists display as empty.
In this example, the absence of a module access policy on the encrypted Short Description field hides the content from all users accessing the Incident table. With a module access policy in place, only users with a specific role are able to see the encrypted data.

Refer to Create a module access policy for setup.
Autogen policies
Autogen policies are automatically system generated based on the default module access policy defined for the given cryptographic module. If there are no granular level policies defined when the system or a script tries to access the given cryptographic module, these global policies are generated and applied.
Autogen policy rules aren’t applied for scheduled jobs types, or field encryption modules (modules where the parent module is Field Encryption).