Docs / Security

Fail-closed enforcement with provable audit trails.

Gvner is built to be inspected, challenged, and verified. Security is embedded in the execution model.

Security topic map

Core guarantees

No bypass paths

External runtimes do not execute directly. All actions pass through Gvner.

Fail closed

Missing decisions, timeouts, or ambiguity result in DENY.

Immutable evidence

Every decision includes an evidence hash and audit identifier.

Deterministic decisions

Policy evaluation is reproducible across time and environments.

Control map

Each security claim maps to an explicit control and evidence output.

Threat model coverage

Unauthorized tool execution is blocked by default
Policy changes require approvals and evidence trail
Audit records are tamper-evident and exportable

Security controls

Identity + access

Role-based access with auditor-only views and scoped API keys.

Network boundaries

Run Gvner behind your boundary or via managed secure endpoints.

Data encryption

Encryption in transit and at rest across evidence storage.

Export integrity

Signed export packs with receipts and verification metadata.