Docs center

Self-hosted docs for Guardrails for AI.

Technical guidance for observability, guardrails, permissioning, and automation in one first-party documentation surface.

Self-hosted docs

Security Model

Comprehensive security framework for AI operations governance.

docs.cyiro.comproduction-ready guidance

Trust boundaries

Clear separation of security domains and responsibilities.

  • Network boundaries: Isolated zones for different security levels
  • Data boundaries: Encryption and access controls for sensitive information
  • API boundaries: Secure endpoints with authentication and authorization
  • Team boundaries: Role-based access with least-privilege principles
  • Audit boundaries: Separate logging and monitoring systems

Control ownership

Defining who is responsible for different security aspects.

  • Platform team: Core infrastructure and security controls
  • Product teams: Application-specific guardrails and policies
  • Security team: Compliance monitoring and incident response
  • Operations team: Runtime monitoring and failover management
  • Audit team: Independent review and validation

Audit responsibilities

Comprehensive audit trail management and oversight.

  • Automated logging: Capture all security-relevant events
  • Regular reviews: Scheduled audit of access patterns and anomalies
  • Incident correlation: Connect audit events to security incidents
  • Compliance reporting: Generate reports for regulatory requirements
  • Independent verification: Third-party audit capabilities

Exception handling

Managing security exceptions and overrides safely.

  • Temporary exceptions: Time-limited bypasses with approval
  • Emergency overrides: Break-glass procedures for critical situations
  • Approval workflows: Multi-person review for sensitive exceptions
  • Audit trails: Complete documentation of all exception usage
  • Automatic revocation: Exceptions expire after defined periods

Break-glass process

Emergency access procedures for critical situations.

  • Pre-approved scenarios: Defined conditions for break-glass activation
  • Multi-factor authentication: Enhanced verification for emergency access
  • Time-limited access: Automatic expiration after emergency resolution
  • Mandatory review: Post-incident analysis of all break-glass usage
  • Notification requirements: Immediate alerting of security teams