AC-04 (21) Information Flow Enforcement - Physical / Logical Separation Of Information Flows

Last modified: May 22, 2026

Introduction

This document describes how Private Mendix Platform fulfills the AC-04 (21) control.

Control ID AC-04 (21)
Control category AC - Information Flow Enforcement
Requirement baseline FEDRAMP MODERATE
Responsibility and ownership Customer - Org

Control

The information system separates information flows logically or physically using organization-defined mechanisms or techniques to accomplish organization-defined required separations by types of information.

Supplemental Guidance

Enforcing the separation of information flows by type can enhance protection by ensuring that information is not commingled while in transit and by enabling flow control by transmission paths perhaps not otherwise achievable. Types of separable information include, for example, inbound and outbound communications traffic, service requests and responses, and information of differing security categories.

Responsibility

Customer Responsibility

The customer (application developer or builder) is responsible for implementing custom microflows within their Mendix application to control and enforce information flow separation at the application logic level.

Guidance

Customer Responsibility

The Private Mendix Platform provides the capability for application builders to implement custom microflows that precisely target and control information flows within their applications. Microflows can be designed to:

  • Enforce data routing rules — ensuring information is only passed between authorized entities or modules.
  • Implement conditional access logic — restricting data flows based on user roles, security contexts, or classification levels.
  • Separate information flows by domain — isolating data between different business units, tenants, or sensitivity levels within the same application.
  • Log and audit information flows — capturing flow events for monitoring and compliance purposes.

Application builders are responsible for designing microflows that align with the physical and logical separation requirements defined by their organization's security policies.

Proof and Remarks

For access rule configurations of the Mendix application model, see below:

Mendix role-based access control (RBAC) can be combined with microflows to enforce separation of information flows at runtime: