Public Overview Docs
Security & Trust
Use this page to understand the trust model behind a real first site: scoped access, evidence handling, audit trail, controlled rollout, recovery controls, and final review materials.
This page is a concise, factual overview of how Edgentik supports:
- scoped access to operational surfaces
- scope clarity so teams do not operate the wrong site by mistake
- traceability and review of what changed, when, and why
- incident evidence review and final review materials
- safe troubleshooting and recovery when something goes wrong
What you should be able to answer in a trustworthy deployment
- Who can access which operational surfaces?
- Which org/site am I operating right now?
- What changed, and when?
- Can we review an incident with enough context to act?
- Can we explain rollout state to a stakeholder without guesswork?
- Can we finish final review with materials a buyer can inspect?
Current trust signals
Scoped access
- authenticated access to the platform
- clear boundaries around which sections are available to each role
- reduced write affordances when a user is meant to review, not change
Scope clarity
- org/site context is visible in the UI
- device, camera, zone, and policy context is understandable during review
- wrong-scope “no data” confusion is easier to catch
Auditability
- review what changed during incidents or rollout troubleshooting
- attribute changes and understand context after the fact
Evidence and final review
- move from incident queue to evidence review
- generate materials for deployment review, stakeholder review, and final review
Diagnostics and recovery
- investigate first before taking high-risk actions
- copy escalation context so support is not guessing
- distinguish scope, rollout, device, and transient issues more clearly
What a buyer should expect in a first site
- a clear commissioning flow from setup to readiness to deploy to verify
- operator-visible incident review with usable context
- explainable rollout state instead of “it seems fine”
- a safe troubleshooting ladder and escalation path
- final review materials when needed
What this page is not
This page is not a full security policy manual or complete security review packet. It is a practical trust overview for buyers, implementation leads, and operations stakeholders.
