📄️ Overview
Entry point for security, data boundaries, provenance, and trust posture.
📄️ Security Overview
High-level security model and control areas.
📄️ Data Boundaries
What data the system touches and where the trust boundaries sit.
📄️ Cryptographic Provenance
How provenance and integrity are established and checked.
📄️ Auditability
How a reviewer can verify what happened in a run.
📄️ Retention and Deletion
How long data persists and how deletion requests are handled.
📄️ Self-Hosted Trust Model
What changes when customers deploy the platform in their own environment.