Security

Controls for protected decision data and retained evidence.

Security detail belongs here: encrypted evidence patterns, audit trail, role-aware access, retention controls, and customer-owned approvals.

Controls

Security posture for enterprise review.

Encrypted evidence patterns

Controlled storage patterns for sensitive decision evidence and supporting files.

Audit trail

Decision events, exports, approvals, and evidence actions can be logged for review.

Role-aware access

Workspace, Vault, billing, report, reviewer, and approver access are separated.

Retention controls

Decision records and evidence can be retained according to plan and customer configuration.

Customer ownership

Final legal, procurement, compliance, and financial approvals remain with customer owners.

Security detail

Controls for protected decision evidence.

Encrypted evidence patterns

Evidence files and retained records use controlled storage and authenticated access patterns.

Audit trail

Decision events, exports, approvals, and evidence actions are logged for governance review.

Role-aware access

Workspace, Vault, billing, and report actions are separated by user role and plan.

Retention controls

Reports, assumptions, supporting files, and export history can be retained with metadata.