Federated SSO
Enterprise directory services integrate via standard federation protocols. Each login is recorded in the audit log with the issuing identity provider.
Sentient Spire QCS™ bakes identity controls, audit logging, and regulatory evidence into the product. Automation only happens when safeguards agree.
Federated identity, MFA, and least privilege are enforced before analysts see a dashboard.
Enterprise directory services integrate via standard federation protocols. Each login is recorded in the audit log with the issuing identity provider.
QR-based Time-based OTP enrollment with admin verification. Analysts cannot access production consoles without MFA.
Analyst, Responder, and Administrator roles define UI access, API scopes, and orchestrator privileges.
Every action—from connector approvals to automated responses—is stored with context.
Accessible directly from the console. Each entry includes actor, action, supporting context, and request identifiers for traceability.
The orchestrator captures every recommendation, confidence score, and resulting action so analysts can replay outcomes at any time.
Comprehensive governance summaries, dataset overviews, and audit extracts stay aligned with each release and are available on request.
Performance dashboards surface precision, recall, false-positive rates, and ingestion timings to support service-level commitments.
Sentient Spire QCS™ is designed to support current and emerging AI governance frameworks.
Risk management, human oversight, and accuracy reporting frameworks are mapped to our operational controls.
Policies for access, audit, business continuity, and incident response align with global security management standards.
Control mapping supports financial services, critical infrastructure, and data-sovereignty requirements across multiple jurisdictions.
Protection of the platform itself follows the same standards we advocate for customers.
Workloads operate within a hardened managed Kubernetes environment with layered network controls and continuous vulnerability scanning.
Credentials are stored in a dedicated secret management service with workload identity federation. No static secrets are baked into containers.
Centralised logging and metrics provide real-time visibility, while critical events alert the on-call engineering team.
We share detailed compliance summaries, audit extracts, penetration test scope, and the shared responsibility model with qualified teams.