PLATFORM // AUTONOMOUS REMEDIATION

Fix it. Don't just flag it.

CSPMs find risk and hand it to a human. PolicyCortex closes the loop. Every action ships a matched captureState / restoreState pair — the runtime refuses to execute any remediation whose rollback path is undefined.

PolicyCortex autonomous remediation in Gated Mode — terminal stream showing Authenticating → Fetching resource state → Analyzing configuration → Waiting Approval, with AI confidence and Reject/Approve actions
Application view · /remediation · Gated Mode
TRUST MODE LADDER

Three modes. Graduate when ready.

01 · SHADOW
Watch only.

Engine drafts a remediation. Logs the plan + estimated blast radius. Does not execute. You read the trail.

GATE
0 actions executed
WHEN
Days 1–7 · trust calibration
02 · GATED
Human approves.

Engine drafts + executes only after explicit approval. Approval can be per-action, per-class, or per-control.

GATE
Approve / reject per action
WHEN
Default mode · most ops time
03 · AUTONOMOUS
Fix on detection.

Engine executes without approval inside scoped policies. Rollback contract verified every time. Audit trail preserved.

GATE
Policy gates · 3/3 required
WHEN
Confidence ≥ 94% · high-volume drift
SAFETY SANDWICH · ANATOMY OF AN ACTION

Six layers between drift and rollback ID.

  1. 00DETECT

    Drift surfaces from continuous monitoring. Severity scored, control mapped.

  2. 01PRE-CHECK

    Pre-flight: blast radius bounded, resource state pinned, policy ack verified.

  3. 02AI DECISION

    Xovyr proposes captureState / restoreState pair. Confidence published.

  4. 03EXECUTE

    Action lands. Cloud API ack captured. State delta hashed.

  5. 04VERIFY

    Post-state validated against intent. Mismatch → automatic rollback.

  6. 05ROLLBACK ID

    Every successful action ships a rollback ID. Reversible by single API call.

LIVE OPS · SAMPLE TENANT
STREAM
14:22:09.184OKremediation.applied target=storage/cui-archive action=disable-public-access rollback=rb-9f3a
14:22:09.214INFOato.evidence.captured control=AC-3(7) hash=4b3a…ce19 retention=7y
14:22:11.041WARNdrift.detected resource=vnet/prod-east severity=HIGH cui-scope=YES owner=platform-team
14:22:11.097INFOai.decision.published target=vnet/prod-east confidence=96% mode=AUTONOMOUS
14:22:11.224OKremediation.applied target=vnet/prod-east gates=3/3 PASSED rollback=rb-9f3b
14:22:12.018INFOssp.section.regenerated family=AC controls=22 output=docx hash=8c2e…d401
14:22:13.412WARNdrift.detected resource=keyvault/prod-secrets severity=MEDIUM ttl=30d owner=security-team
14:22:13.498INFOai.decision.published target=keyvault/prod-secrets confidence=88% mode=GATED
14:22:13.516INFOapproval.pending ticket=AP-0432 owner=security-team channel=teams
ROLLBACK CONTRACT · TYPE SIG

Every action has an inverse. Or it doesn't run.

interface RemediationHandler<R> {
  captureState(target: R): Promise<State>
  apply(target: R, intent: Intent): Promise<Delta>
  restoreState(target: R, state: State): Promise<void>
  verify(target: R, expected: Intent): Promise<Boolean>
}

// runtime guarantee
//   captureState ∘ restoreState ≡ identity
//   restoreState refuses if State.hash mismatch
HANDLERS SHIPPED
214
PATENTS FILED
4
FAQ // REMEDIATION

What is the Safety Sandwich?

Pre-execution validation (blast radius, resource state, policy compliance) and post-execution verification (state delta hashes match intent), wrapped around every remediation. If anything fails, automatic rollback engages. Patent-pending.

Can I require human approval before every remediation?

Yes — GATED is the default trust mode. Approval can be per-action, per-control class, per-resource type, or per-environment. Most teams stay in GATED indefinitely for high-impact control families and move to AUTONOMOUS only for narrow, well-tested classes.

What happens if a remediation fails?

Every remediation action ships a rollback ID. If post-state validation fails, rollback engages automatically. You can also trigger rollback manually at any time via API or the Command Center.

Does PolicyCortex modify production resources?

Only with explicit permission. You control which resource classes can be touched autonomously vs which require approval. Production is never touched without your configured approval workflow.

PILOT // 30-DAY

See the substrate. In your own cloud.

30 days, $15K flat. Connect a cloud, run in SHADOW mode for the first week, graduate to GATED — keep what works.

SYS: ONLINE
FOCUSCMMC L2 / L3
BUILD0aed52
CMMC DEADLINET-d
©2026 POLICYCORTEX, INC.