Security reviews shouldn’t feel like a hostage negotiation. Yet too many teams still spend hours waiting for approvals, juggling VPN credentials, and second-guessing who can access what. Compass Mercurial changes that equation by turning identity and source trust into programmable infrastructure instead of paperwork.
At its core, Compass manages identity boundaries. Mercurial tracks code and configuration versions. Together, they form a predictable system for defining who touches data, when, and under what versioned policy. It feels like adding Git discipline to your access control. You can roll back credentials the way you roll back commits. No more guessing which secret someone used last quarter.
In a modern workflow, Compass acts as the policy brain that speaks to your identity provider, usually through OIDC or SAML. Mercurial holds the audit trail, embedding commit-based intent into every permission change. When combined, your automation layer can pull verified permissions tied to known commits. CI/CD pipelines only run if authenticated identities match approved versions in Mercurial. It’s versioned trust, not static tokens.
The setup logic is simple. You sync Compass with your identity source like Okta or AWS IAM. Each resource maps to a branch or tag in Mercurial. Access requests route through Compass, which checks both the human identity and the code context. If either drifts, access is denied before anything fragile happens. That single pattern fixes more compliance nightmares than most people admit.
Common Compass Mercurial best practices:
- Rotate identity secrets on the same cadence as source version tags.
- Treat permission changes as code reviews, complete with PR approval.
- Log everything—Compass emits structured audit data; Mercurial preserves chronology.
- Use immutable references in pipelines, not mutable branches.
Benefits you can picture right away: